Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 706632 Details for
Bug 919064
ssl.sh: #3268: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
ppc64 build log
build.log (text/plain), 12.02 MB, created by
Karsten Hopp
on 2013-03-07 14:19:42 UTC
(
hide
)
Description:
ppc64 build log
Filename:
MIME Type:
Creator:
Karsten Hopp
Created:
2013-03-07 14:19:42 UTC
Size:
12.02 MB
patch
obsolete
>Mock Version: 1.1.28 >Mock Version: 1.1.28 >ENTER do(['bash', '--login', '-c', 'rpmbuild -bs --target ppc64 --nodeps builddir/build/SPECS/nss.spec'], False, '/var/lib/mock/SHADOWBUILD-f19-build-274443-187818/root/', None, 172800, True, False, 498, 497, None, False, {'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOSTNAME': 'mock', 'PROMPT_COMMAND': 'echo -n "<mock-chroot>"', 'HOME': '/builddir', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin'}, logger=<mockbuild.trace_decorator.getLog object at 0x1001391df10>) >Executing command: ['bash', '--login', '-c', 'rpmbuild -bs --target ppc64 --nodeps builddir/build/SPECS/nss.spec'] with env {'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOSTNAME': 'mock', 'PROMPT_COMMAND': 'echo -n "<mock-chroot>"', 'HOME': '/builddir', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin'} >Building target platforms: ppc64 >Building for target ppc64 >Wrote: /builddir/build/SRPMS/nss-3.14.3-9.fc19.src.rpm >Child return code was: 0 >LEAVE do --> > >ENTER do(['bash', '--login', '-c', 'rpmbuild -bb --target ppc64 --nodeps builddir/build/SPECS/nss.spec'], False, '/var/lib/mock/SHADOWBUILD-f19-build-274443-187818/root/', None, 172800, True, False, 498, 497, None, False, {'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOSTNAME': 'mock', 'PROMPT_COMMAND': 'echo -n "<mock-chroot>"', 'HOME': '/builddir', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin'}, logger=<mockbuild.trace_decorator.getLog object at 0x1001391df10>) >Executing command: ['bash', '--login', '-c', 'rpmbuild -bb --target ppc64 --nodeps builddir/build/SPECS/nss.spec'] with env {'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOSTNAME': 'mock', 'PROMPT_COMMAND': 'echo -n "<mock-chroot>"', 'HOME': '/builddir', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin'} >Building target platforms: ppc64 >Building for target ppc64 >Executing(%prep): /bin/sh -e /var/tmp/rpm-tmp.seeCRe >+ umask 022 >+ cd /builddir/build/BUILD >+ cd /builddir/build/BUILD >+ rm -rf nss-3.14.3 >+ /usr/bin/bzip2 -dc /builddir/build/SOURCES/nss-3.14.3-stripped.tar.bz2 >+ /usr/bin/tar -xf - >+ STATUS=0 >+ '[' 0 -ne 0 ']' >+ cd nss-3.14.3 >+ /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . >+ /usr/bin/cp /builddir/build/SOURCES/PayPalEE.cert -f ./mozilla/security/nss/tests/libpkix/certs >+ cd /builddir/build/BUILD >+ cd nss-3.14.3 >+ /usr/bin/bzip2 -dc /builddir/build/SOURCES/nss-pem-20120811.tar.bz2 >+ /usr/bin/tar -xf - >+ STATUS=0 >+ '[' 0 -ne 0 ']' >+ /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . >+ echo 'Patch #2 (add-relro-linker-option.patch):' >Patch #2 (add-relro-linker-option.patch): >+ /usr/bin/cat /builddir/build/SOURCES/add-relro-linker-option.patch >+ /usr/bin/patch -p0 -b --suffix .relro --fuzz=0 >patching file mozilla/security/coreconf/Linux.mk >Hunk #1 succeeded at 174 (offset -5 lines). >+ echo 'Patch #3 (renegotiate-transitional.patch):' >Patch #3 (renegotiate-transitional.patch): >+ /usr/bin/cat /builddir/build/SOURCES/renegotiate-transitional.patch >+ /usr/bin/patch -p0 -b --suffix .transitional --fuzz=0 >patching file mozilla/security/nss/lib/ssl/sslsock.c >Hunk #1 succeeded at 150 (offset -32 lines). >+ echo 'Patch #6 (nss-enable-pem.patch):' >Patch #6 (nss-enable-pem.patch): >+ /usr/bin/cat /builddir/build/SOURCES/nss-enable-pem.patch >+ /usr/bin/patch -p0 -b --suffix .libpem --fuzz=0 >patching file ./mozilla/security/nss/lib/ckfw/manifest.mn >Hunk #1 succeeded at 6 (offset -32 lines). >+ echo 'Patch #16 (nss-539183.patch):' >Patch #16 (nss-539183.patch): >+ /usr/bin/cat /builddir/build/SOURCES/nss-539183.patch >+ /usr/bin/patch -p0 -b --suffix .539183 --fuzz=0 >patching file ./mozilla/security/nss/cmd/httpserv/httpserv.c >patching file ./mozilla/security/nss/cmd/selfserv/selfserv.c >+ echo 'Patch #18 (nss-646045.patch):' >Patch #18 (nss-646045.patch): >+ /usr/bin/cat /builddir/build/SOURCES/nss-646045.patch >+ /usr/bin/patch -p0 -b --suffix .646045 --fuzz=0 >patching file ./mozilla/security/nss/tests/dbtests/dbtests.sh >Hunk #1 succeeded at 168 (offset -33 lines). >Hunk #2 succeeded at 178 (offset -33 lines). >Hunk #3 succeeded at 189 (offset -33 lines). >Patch #25 (nsspem-use-system-freebl.patch): >+ echo 'Patch #25 (nsspem-use-system-freebl.patch):' >+ /usr/bin/cat /builddir/build/SOURCES/nsspem-use-system-freebl.patch >+ /usr/bin/patch -p0 -b --suffix .systemfreebl --fuzz=0 >patching file ./mozilla/security/coreconf/Linux.mk >Hunk #1 succeeded at 183 (offset 1 line). >patching file ./mozilla/security/nss/lib/ckfw/pem/config.mk >patching file ./mozilla/security/nss/lib/ckfw/pem/Makefile >patching file ./mozilla/security/nss/lib/ckfw/pem/manifest.mn >Patch #39 (nss-ssl-enforce-no-pkcs11-bypass.path): >+ echo 'Patch #39 (nss-ssl-enforce-no-pkcs11-bypass.path):' >+ /usr/bin/cat /builddir/build/SOURCES/nss-ssl-enforce-no-pkcs11-bypass.path >+ /usr/bin/patch -p1 -b --suffix .nobypass --fuzz=0 >patching file mozilla/security/nss/lib/ssl/sslsock.c >+ echo 'Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch):' >Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch): >+ /usr/bin/cat /builddir/build/SOURCES/nss-3.14.0.0-disble-ocsp-test.patch >+ /usr/bin/patch -p1 -b --suffix .noocsptest --fuzz=0 >patching file mozilla/security/nss/tests/chains/scenarios/scenarios >Patch #43 (no-softoken-freebl-tests.patch): >+ echo 'Patch #43 (no-softoken-freebl-tests.patch):' >+ /usr/bin/cat /builddir/build/SOURCES/no-softoken-freebl-tests.patch >+ /usr/bin/patch -p0 -b --suffix .nosoftokentests --fuzz=0 >patching file ./mozilla/security/nss/cmd/Makefile >patching file ./mozilla/security/nss/cmd/manifest.mn >+ echo 'Patch #44 (0001-sync-up-with-upstream-softokn-changes.patch):' >Patch #44 (0001-sync-up-with-upstream-softokn-changes.patch): >+ /usr/bin/cat /builddir/build/SOURCES/0001-sync-up-with-upstream-softokn-changes.patch >+ /usr/bin/patch -p1 -b --suffix .syncupwithupstream --fuzz=0 >patching file mozilla/security/nss/lib/ckfw/pem/rsawrapr.c >Patch #45 (Bug-896651-pem-dont-trash-keys-on-failed-login.patch): >+ echo 'Patch #45 (Bug-896651-pem-dont-trash-keys-on-failed-login.patch):' >+ /usr/bin/cat /builddir/build/SOURCES/Bug-896651-pem-dont-trash-keys-on-failed-login.patch >+ /usr/bin/patch -p0 -b --suffix .notrash --fuzz=0 >patching file mozilla/security/nss/lib/ckfw/pem/psession.c >+ exit 0 >Executing(%build): /bin/sh -e /var/tmp/rpm-tmp.lwOS6I >+ umask 022 >+ cd /builddir/build/BUILD >+ cd nss-3.14.3 >+ NSS_NO_PKCS11_BYPASS=1 >+ export NSS_NO_PKCS11_BYPASS >+ FREEBL_NO_DEPEND=1 >+ export FREEBL_NO_DEPEND >+ BUILD_OPT=1 >+ export BUILD_OPT >+ XCFLAGS='-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64' >+ export XCFLAGS >+ PKG_CONFIG_ALLOW_SYSTEM_LIBS=1 >+ PKG_CONFIG_ALLOW_SYSTEM_CFLAGS=1 >+ export PKG_CONFIG_ALLOW_SYSTEM_LIBS >+ export PKG_CONFIG_ALLOW_SYSTEM_CFLAGS >++ /usr/bin/pkg-config --cflags-only-I nspr >++ sed s/-I// >+ NSPR_INCLUDE_DIR='/usr/include/nspr4 ' >+ NSPR_LIB_DIR=/usr/lib64 >+ export NSPR_INCLUDE_DIR >+ export NSPR_LIB_DIR >++ /usr/bin/pkg-config --cflags-only-I nss-softokn >++ sed s/-I// >+ export 'FREEBL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' >+ FREEBL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' >+ export FREEBL_LIB_DIR=/usr/lib64 >+ FREEBL_LIB_DIR=/usr/lib64 >+ export USE_SYSTEM_FREEBL=1 >+ USE_SYSTEM_FREEBL=1 >+ NSS_USE_SYSTEM_SQLITE=1 >+ export NSS_USE_SYSTEM_SQLITE >+ USE_64=1 >+ export USE_64 >+ unset NSS_ENABLE_ECC >+ /usr/bin/make -C ./mozilla/security/coreconf >make: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/coreconf' >cd nsinstall; /usr/bin/make export >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/coreconf/nsinstall' >make[1]: Nothing to be done for `export'. >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/coreconf/nsinstall' >cd nsinstall; /usr/bin/make libs >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/coreconf/nsinstall' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 nsinstall.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pathsub.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pathsub.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pathsub.o -m64 -Wl,-z,relro -lpthread -ldl -lc >true -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall ../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/coreconf/nsinstall' >make: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/coreconf' >+ /usr/bin/make -C ./mozilla/security/dbm >make: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm' >cd include; /usr/bin/make export >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm/include' >Creating ../../../dist/public/dbm >../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ../../../dbm/include/cdefs.h ../../../dbm/include/mcom_db.h ../../../dbm/include/ncompat.h ../../../dbm/include/winfile.h ../../../dist/public/dbm >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm/include' >cd src; /usr/bin/make export >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm/src' >make[1]: Nothing to be done for `export'. >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm/src' >cd include; /usr/bin/make libs >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm/include' >make[1]: Nothing to be done for `libs'. >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm/include' >cd src; /usr/bin/make libs >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm/src' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/db.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ../../../dbm/src/db.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/h_bigkey.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ../../../dbm/src/h_bigkey.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/h_func.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ../../../dbm/src/h_func.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/h_log2.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ../../../dbm/src/h_log2.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/h_page.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ../../../dbm/src/h_page.c >../../../dbm/src/h_page.c: In function 'new_lseek': >../../../dbm/src/h_page.c:165:15: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result] > write(fd, (char*)&buffer, (size_t)(1024 > len ? len : 1024)); > ^ >../../../dbm/src/h_page.c: In function 'overflow_page': >../../../dbm/src/h_page.c:1002:4: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result] > (void)write(STDERR_FILENO, OVMSG, sizeof(OVMSG) - 1); > ^ >../../../dbm/src/h_page.c:1017:4: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result] > (void)write(STDERR_FILENO, OVMSG, sizeof(OVMSG) - 1); > ^ >../../../dbm/src/h_page.c:1043:5: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result] > (void)write(STDERR_FILENO, OVMSG, > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/hash.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ../../../dbm/src/hash.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/hash_buf.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ../../../dbm/src/hash_buf.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/mktemp.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ../../../dbm/src/mktemp.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dirent.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 dirent.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libdbm.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libdbm.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/db.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/h_bigkey.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/h_func.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/h_log2.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/h_page.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/hash.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/hash_buf.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/mktemp.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dirent.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libdbm.a >../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libdbm.a ../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm/src' >make: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm' >+ /usr/bin/make -C ./mozilla/security/nss/lib/util export >make: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/util' >Creating ../../../../dist/public/nss >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 base64.h ciferfam.h hasht.h nssb64.h nssb64t.h nsslocks.h nssilock.h nssilckt.h nssrwlk.h nssrwlkt.h nssutil.h pkcs11.h pkcs11f.h pkcs11p.h pkcs11t.h pkcs11n.h pkcs11u.h portreg.h secasn1.h secasn1t.h seccomon.h secder.h secdert.h secdig.h secdigt.h secitem.h secoid.h secoidt.h secport.h secerr.h utilmodt.h utilrename.h utilpars.h utilparst.h ../../../../dist/public/nss >Creating ../../../../dist/private/nss >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 templates.c ../../../../dist/private/nss >make: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/util' >+ /usr/bin/make -C ./mozilla/security/nss/lib/freebl export >make: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/freebl' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 blapit.h shsign.h ecl/ecl-exp.h ../../../../dist/public/nss >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 alghmac.h blapi.h hmacct.h secmpi.h secrng.h ec.h ecl/ecl.h ecl/ecl-curve.h ../../../../dist/private/nss >make: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/freebl' >+ /usr/bin/make -C ./mozilla/security/nss/lib/softoken export >make: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken' >cd legacydb; /usr/bin/make export >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken/legacydb' >There are no private exports. >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken/legacydb' >cd legacydb; /usr/bin/make private_export >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken/legacydb' >There are no private exports. >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken/legacydb' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 lgglue.h lowkeyi.h lowkeyti.h pkcs11ni.h softoken.h softoknt.h softkver.h sdb.h sftkdbt.h ../../../../dist/private/nss >make: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken' >+ /usr/bin/make -C ./mozilla/security/nss/lib/util >make: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/util' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 base64.h ciferfam.h hasht.h nssb64.h nssb64t.h nsslocks.h nssilock.h nssilckt.h nssrwlk.h nssrwlkt.h nssutil.h pkcs11.h pkcs11f.h pkcs11p.h pkcs11t.h pkcs11n.h pkcs11u.h portreg.h secasn1.h secasn1t.h seccomon.h secder.h secdert.h secdig.h secdigt.h secitem.h secoid.h secoidt.h secport.h secerr.h utilmodt.h utilrename.h utilpars.h utilparst.h ../../../../dist/public/nss >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 templates.c ../../../../dist/private/nss >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/quickder.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 quickder.c >quickder.c: In function 'DecodeItem': >quickder.c:611:12: warning: variable 'optional' set but not used [-Wunused-but-set-variable] > PRBool optional = PR_FALSE; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secdig.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 secdig.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/derdec.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 derdec.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/derenc.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 derenc.c >derenc.c: In function 'der_encode': >derenc.c:282:22: warning: variable 'optional' set but not used [-Wunused-but-set-variable] > PRBool explicit, optional, universal; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dersubr.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 dersubr.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dertime.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 dertime.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/errstrs.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 errstrs.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssb64d.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 nssb64d.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssb64e.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 nssb64e.c >nssb64e.c: In function 'NSSBase64_EncodeItem_Util': >nssb64e.c:686:15: warning: 'out_len' may be used uninitialized in this function [-Wmaybe-uninitialized] > out_string[out_len] = '\0'; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssrwlk.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 nssrwlk.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssilock.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 nssilock.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/oidstring.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 oidstring.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/portreg.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 portreg.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secalgid.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 secalgid.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secasn1d.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 secasn1d.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secasn1e.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 secasn1e.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secasn1u.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 secasn1u.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secitem.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 secitem.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secload.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 secload.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secoid.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 secoid.c >secoid.c: In function 'secoid_HashNumber': >secoid.c:1878:12: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > return (PLHashNumber) key; > ^ >secoid.c: In function 'SECOID_Init': >secoid.c:1919:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] > volatile char c; /* force a reference that won't get optimized away */ > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sectime.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sectime.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secport.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 secport.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/templates.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 templates.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/utf8.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 utf8.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/utilmod.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 utilmod.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/utilpars.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 utilpars.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssutil.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssutil.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/quickder.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secdig.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/derdec.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/derenc.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dersubr.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dertime.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/errstrs.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssb64d.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssb64e.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssrwlk.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssilock.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/oidstring.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/portreg.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secalgid.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secasn1d.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secasn1e.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secasn1u.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secitem.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secload.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secoid.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sectime.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secport.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/templates.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/utf8.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/utilmod.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/utilpars.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssutil.a >grep -v ';-' nssutil.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssutil.def >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssutil3.so >gcc -shared -m64 -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnssutil3.so -Wl,--version-script,Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssutil.def -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssutil3.so Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/quickder.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secdig.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/derdec.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/derenc.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dersubr.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dertime.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/errstrs.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssb64d.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssb64e.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssrwlk.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssilock.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/oidstring.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/portreg.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secalgid.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secasn1d.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secasn1e.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secasn1u.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secitem.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secload.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secoid.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sectime.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secport.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/templates.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/utf8.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/utilmod.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/utilpars.o -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >chmod +x Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssutil3.so >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssutil.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssutil3.so ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/util' >+ /usr/bin/make -C ./mozilla/security/nss/lib/freebl >make: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/freebl' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 blapit.h shsign.h ecl/ecl-exp.h ../../../../dist/public/nss >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 alghmac.h blapi.h hmacct.h secmpi.h secrng.h ec.h ecl/ecl.h ecl/ecl-curve.h ../../../../dist/private/nss >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/loader.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 loader.c >loader.c: In function 'freebl_LoadDSO': >loader.c:133:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] > PRStatus status; > ^ >loader.c: In function 'BL_Unload': >loader.c:902:20: warning: unused variable 'status' [-Wunused-variable] > PRStatus status = PR_UnloadLibrary(blLib); > ^ >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libfreebl.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libfreebl.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/loader.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libfreebl.a >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libfreebl.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >mkdir Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB >/usr/bin/make FREEBL_CHILD_BUILD=1 \ > OBJDIR=Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB libs >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/freebl' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 freeblver.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ldvector.c >ldvector.c: In function 'FREEBL_GetVector': >ldvector.c:279:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] > volatile char c; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sysrand.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sha_fast.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 md2.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 md5.c >md5.c: In function 'md5_prep_state_le': >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:274:15: note: in expansion of macro 'lendian' > cx->u.w[0] = lendian(cx->u.w[0]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:275:15: note: in expansion of macro 'lendian' > cx->u.w[1] = lendian(cx->u.w[1]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:276:15: note: in expansion of macro 'lendian' > cx->u.w[2] = lendian(cx->u.w[2]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:277:15: note: in expansion of macro 'lendian' > cx->u.w[3] = lendian(cx->u.w[3]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:278:15: note: in expansion of macro 'lendian' > cx->u.w[4] = lendian(cx->u.w[4]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:279:15: note: in expansion of macro 'lendian' > cx->u.w[5] = lendian(cx->u.w[5]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:280:15: note: in expansion of macro 'lendian' > cx->u.w[6] = lendian(cx->u.w[6]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:281:15: note: in expansion of macro 'lendian' > cx->u.w[7] = lendian(cx->u.w[7]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:282:15: note: in expansion of macro 'lendian' > cx->u.w[8] = lendian(cx->u.w[8]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:283:15: note: in expansion of macro 'lendian' > cx->u.w[9] = lendian(cx->u.w[9]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:284:16: note: in expansion of macro 'lendian' > cx->u.w[10] = lendian(cx->u.w[10]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:285:16: note: in expansion of macro 'lendian' > cx->u.w[11] = lendian(cx->u.w[11]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:286:16: note: in expansion of macro 'lendian' > cx->u.w[12] = lendian(cx->u.w[12]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:287:16: note: in expansion of macro 'lendian' > cx->u.w[13] = lendian(cx->u.w[13]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:288:16: note: in expansion of macro 'lendian' > cx->u.w[14] = lendian(cx->u.w[14]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:289:16: note: in expansion of macro 'lendian' > cx->u.w[15] = lendian(cx->u.w[15]); > ^ >md5.c: In function 'MD5_End': >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:516:16: note: in expansion of macro 'lendian' > cx->u.w[14] = lendian(lowInput); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:517:16: note: in expansion of macro 'lendian' > cx->u.w[15] = lendian(highInput); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:529:14: note: in expansion of macro 'lendian' > cx->cv[0] = lendian(cx->cv[0]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:530:14: note: in expansion of macro 'lendian' > cx->cv[1] = lendian(cx->cv[1]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:531:14: note: in expansion of macro 'lendian' > cx->cv[2] = lendian(cx->cv[2]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:532:14: note: in expansion of macro 'lendian' > cx->cv[3] = lendian(cx->cv[3]); > ^ >md5.c: In function 'MD5_EndRaw': >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:553:10: note: in expansion of macro 'lendian' > cv[0] = lendian(cv[0]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:554:10: note: in expansion of macro 'lendian' > cv[1] = lendian(cv[1]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:555:10: note: in expansion of macro 'lendian' > cv[2] = lendian(cv[2]); > ^ >md5.c:262:61: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > (tmp = i32 >> 16 | i32 << 16, (tmp & MASK) << 8 | tmp >> 8 & MASK) > ^ >md5.c:556:10: note: in expansion of macro 'lendian' > cv[3] = lendian(cv[3]); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sha512.c >sha512.c: In function 'SHA256_End': >sha512.c:431:14: warning: unused variable 't1' [-Wunused-variable] > PRUint32 t1; > ^ >sha512.c: In function 'SHA256_EndRaw': >sha512.c:472:14: warning: unused variable 't1' [-Wunused-variable] > PRUint32 t1; > ^ >sha512.c: In function 'SHA512_End': >sha512.c:1227:14: warning: unused variable 't1' [-Wunused-variable] > PRUint64 t1; > ^ >sha512.c: In function 'SHA512_EndRaw': >sha512.c:1273:14: warning: unused variable 't1' [-Wunused-variable] > PRUint64 t1; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 alghmac.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 rawhash.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 alg2268.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 arcfour.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 arcfive.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -fno-strict-aliasing desblapi.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/des.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 des.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 drbg.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/cts.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cts.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ctr.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ctr.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/gcm.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 gcm.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/hmacct.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 hmacct.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 rijndael.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 aeskeywrap.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 camellia.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 dh.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ec.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pqg.c >pqg.c: In function 'pqg_ParamGen': >pqg.c:1234:19: warning: variable 'b' set but not used [-Wunused-but-set-variable] > unsigned int b; /* Per FIPS 186, app 2.2. 186-3 app A.1.1.2 */ > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 dsa.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 rsa.c >rsa.c: In function 'get_blinding_params': >rsa.c:1098:29: warning: variable 'prevbp' set but not used [-Wunused-but-set-variable] > blindingParams *bp, *prevbp = NULL; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 shvfy.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 tlsprfalg.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 seed.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 jpake.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 mpi/mpprime.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 mpi/mpmontg.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 mpi/mplogic.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 mpi/mpi.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 mpi/mp_gf2m.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 mpi/mpcpucache.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 stubs.c >grep -v ';-' freebl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so >gcc -shared -m64 -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libfreebl3.so -Wl,--version-script,Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def -Wl,-Bsymbolic -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/des.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/cts.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ctr.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/gcm.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/hmacct.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o -ldl -lc >chmod +x Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/freebl' >make: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/freebl' >+ /usr/bin/make -C ./mozilla/security/nss/lib/softoken >make: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken' >cd legacydb; /usr/bin/make export >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken/legacydb' >There are no private exports. >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken/legacydb' >cd legacydb; /usr/bin/make private_export >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken/legacydb' >There are no private exports. >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken/legacydb' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 lgglue.h lowkeyi.h lowkeyti.h pkcs11ni.h softoken.h softoknt.h softkver.h sdb.h sftkdbt.h ../../../../dist/private/nss >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ecdecode.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecdecode.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/fipsaudt.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 fipsaudt.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/fipstest.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 fipstest.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/fipstokn.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 fipstokn.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lgglue.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 lgglue.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lowkey.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 lowkey.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lowpbe.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 lowpbe.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/padbuf.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 padbuf.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkcs11.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkcs11.c >pkcs11.c: In function 'sftk_HashNumber': >pkcs11.c:2138:12: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > return (PLHashNumber) key; > ^ >pkcs11.c: In function 'NSC_GetInfo': >pkcs11.c:3062:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] > volatile char c; /* force a reference that won't get optimized away */ > ^ >pkcs11.c: In function 'NSC_CreateObject': >pkcs11.c:4004:21: warning: 'moduleIndex' may be used uninitialized in this function [-Wmaybe-uninitialized] > crv = SFTK_SlotInit(paramStrings.configdir, > ^ >pkcs11.c:3924:19: note: 'moduleIndex' was declared here > unsigned long moduleIndex; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkcs11c.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkcs11c.c >pkcs11c.c: In function 'NSC_SignInit': >pkcs11c.c:2275:25: warning: assignment from incompatible pointer type [enabled by default] > context->update = sftk_SignCopy; > ^ >pkcs11c.c:2304:25: warning: assignment from incompatible pointer type [enabled by default] > context->update = sftk_SignCopy; > ^ >pkcs11c.c: In function 'NSC_GenerateKeyPair': >pkcs11c.c:3994:11: warning: variable 'private_value_bits' set but not used [-Wunused-but-set-variable] > int private_value_bits = 0; > ^ >pkcs11c.c: At top level: >pkcs11c.c:461:1: warning: 'sftk_EncryptOAEP' defined but not used [-Wunused-function] > sftk_EncryptOAEP(SFTKOAEPEncryptInfo *info, unsigned char *output, > ^ >pkcs11c.c:470:1: warning: 'sftk_DecryptOAEP' defined but not used [-Wunused-function] > sftk_DecryptOAEP(SFTKOAEPDecryptInfo *info, unsigned char *output, > ^ >pkcs11c.c:5405:14: warning: 'sftk_ANSI_X9_63_kdf' defined but not used [-Wunused-function] > static CK_RV sftk_ANSI_X9_63_kdf(CK_BYTE **key, CK_ULONG key_len, > ^ >pkcs11c.c: In function 'NSC_GenerateKeyPair': >pkcs11c.c:3914:6: warning: 'subPrimeLen' may be used uninitialized in this function [-Wmaybe-uninitialized] > crv = NSC_Verify(hSession, > ^ >pkcs11c.c:3696:14: note: 'subPrimeLen' was declared here > CK_ULONG subPrimeLen; > ^ >pkcs11c.c:3866:23: warning: 'modulusLen' may be used uninitialized in this function [-Wmaybe-uninitialized] > signature_length = modulusLen; > ^ >pkcs11c.c:3695:14: note: 'modulusLen' was declared here > CK_ULONG modulusLen; > ^ >pkcs11c.c: In function 'NSC_GenerateKey': >pkcs11c.c:3622:13: warning: 'hashType' may be used uninitialized in this function [-Wmaybe-uninitialized] > crv = jpake_Round1(hashType, > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkcs11u.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkcs11u.c >pkcs11u.c: In function 'sftk_DeleteObject': >pkcs11u.c:1177:22: warning: unused variable 'to' [-Wunused-variable] > SFTKTokenObject *to = sftk_narrowToTokenObject(object); > ^ >pkcs11u.c: In function 'sftk_NewTokenObject': >pkcs11u.c:1902:22: warning: variable 'tokObject' set but not used [-Wunused-but-set-variable] > SFTKTokenObject *tokObject = NULL; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/rsawrapr.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 rsawrapr.c >rsawrapr.c: In function 'constantTimeEQ8': >rsawrapr.c:30:27: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > unsigned char c = ~(a - b | b - a); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sdb.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sdb.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sftkdb.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sftkdb.c >sftkdb.c: In function 'sftkdb_fixupTemplateOut': >sftkdb.c:328:22: warning: variable 'data' set but not used [-Wunused-but-set-variable] > unsigned char *data; > ^ >sftkdb.c: In function 'sftkdb_CreateObject': >sftkdb.c:576:12: warning: variable 'inTransaction' set but not used [-Wunused-but-set-variable] > PRBool inTransaction = PR_FALSE; > ^ >sftkdb.c: In function 'sftkdb_handleIDAndName': >sftkdb.c:2014:11: warning: variable 'crv' set but not used [-Wunused-but-set-variable] > CK_RV crv; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sftkhmac.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sftkhmac.c >sftkhmac.c: In function 'sftk_HMACConstantTime_Update': >sftkhmac.c:149:15: warning: unused variable 'rv' [-Wunused-variable] > SECStatus rv = HMAC_ConstantTime( > ^ >sftkhmac.c: In function 'sftk_SSLv3MACConstantTime_Update': >sftkhmac.c:163:15: warning: unused variable 'rv' [-Wunused-variable] > SECStatus rv = SSLv3_MAC_ConstantTime( > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sftkpars.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sftkpars.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sftkpwd.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sftkpwd.c >sftkpwd.c: In function 'sftk_updateMacs': >sftkpwd.c:868:11: warning: variable 'crv2' set but not used [-Wunused-but-set-variable] > CK_RV crv2; > ^ >sftkpwd.c:867:11: warning: variable 'crv' set but not used [-Wunused-but-set-variable] > CK_RV crv = CKR_OK; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/softkver.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 softkver.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/tlsprf.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 tlsprf.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/jpakesftk.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 jpakesftk.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsoftokn.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsoftokn.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ecdecode.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/fipsaudt.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/fipstest.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/fipstokn.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lgglue.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lowkey.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lowpbe.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/padbuf.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkcs11.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkcs11c.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkcs11u.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/rsawrapr.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sdb.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sftkdb.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sftkhmac.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sftkpars.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sftkpwd.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/softkver.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/tlsprf.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/jpakesftk.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsoftokn.a >grep -v ';-' softokn.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/softokn.def >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsoftokn3.so >gcc -shared -m64 -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libsoftokn3.so -Wl,--version-script,Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/softokn.def -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsoftokn3.so Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ecdecode.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/fipsaudt.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/fipstest.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/fipstokn.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lgglue.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lowkey.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lowpbe.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/padbuf.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkcs11.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkcs11c.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkcs11u.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/rsawrapr.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sdb.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sftkdb.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sftkhmac.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sftkpars.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sftkpwd.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/softkver.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/tlsprf.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/jpakesftk.o ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >chmod +x Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsoftokn3.so >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsoftokn.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsoftokn3.so ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >cd legacydb; /usr/bin/make libs >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken/legacydb' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dbmshim.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 dbmshim.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/keydb.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 keydb.c >keydb.c: In function 'encodePWCheckEntry': >keydb.c:1994:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] > SECStatus rv; > ^ >keydb.c: In function 'nsslowkey_ResetKeyDB': >keydb.c:2036:9: warning: variable 'ret' set but not used [-Wunused-but-set-variable] > int ret; > ^ >keydb.c: In function 'keydb_Get': >keydb.c:2093:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] > PRStatus prstat; > ^ >keydb.c: In function 'keydb_Put': >keydb.c:2111:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] > PRStatus prstat; > ^ >keydb.c: In function 'keydb_Sync': >keydb.c:2129:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] > PRStatus prstat; > ^ >keydb.c: In function 'keydb_Del': >keydb.c:2147:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] > PRStatus prstat; > ^ >keydb.c: In function 'keydb_Seq': >keydb.c:2165:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] > PRStatus prstat; > ^ >keydb.c: In function 'keydb_Close': >keydb.c:2183:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] > PRStatus prstat; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lgattr.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 lgattr.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lgcreate.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 lgcreate.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lgdestroy.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 lgdestroy.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lgfind.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 lgfind.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lginit.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 lginit.c >lginit.c: In function 'lg_HashNumber': >lginit.c:486:12: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > return (PLHashNumber) key; > ^ >lginit.c: In function 'lg_CompareValues': >lginit.c:492:27: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > PLHashNumber value1 = (PLHashNumber) v1; > ^ >lginit.c:493:27: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > PLHashNumber value2 = (PLHashNumber) v2; > ^ >lginit.c: In function 'legacy_Open': >lginit.c:597:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] > volatile char c; /* force a reference that won't get optimized away */ > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lgutil.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 lgutil.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lowcert.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 lowcert.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lowkey.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 lowkey.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pcertdb.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pcertdb.c >pcertdb.c: In function 'nsslowcert_UnlockDB': >pcertdb.c:108:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] > PRStatus prstat; > ^ >pcertdb.c: In function 'nsslowcert_UnlockCertRefCount': >pcertdb.c:139:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] > PRStatus prstat; > ^ >pcertdb.c: In function 'nsslowcert_UnlockCertTrust': >pcertdb.c:171:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] > PRStatus prstat; > ^ >pcertdb.c: In function 'nsslowcert_UnlockFreeList': >pcertdb.c:204:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] > PRStatus prstat = PR_SUCCESS; > ^ >pcertdb.c: In function 'certdb_Get': >pcertdb.c:229:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] > PRStatus prstat; > ^ >pcertdb.c: In function 'certdb_Put': >pcertdb.c:245:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] > PRStatus prstat; > ^ >pcertdb.c: In function 'certdb_Sync': >pcertdb.c:261:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] > PRStatus prstat; > ^ >pcertdb.c: In function 'certdb_Del': >pcertdb.c:278:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] > PRStatus prstat; > ^ >pcertdb.c: In function 'certdb_Seq': >pcertdb.c:299:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] > PRStatus prstat; > ^ >pcertdb.c: In function 'certdb_Close': >pcertdb.c:315:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] > PRStatus prstat = PR_SUCCESS; > ^ >pcertdb.c: In function 'NewDBSubjectEntry': >pcertdb.c:2435:18: warning: variable 'eaddrlen' set but not used [-Wunused-but-set-variable] > unsigned int eaddrlen; > ^ >pcertdb.c: In function 'UpdateV6DB': >pcertdb.c:3591:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] > SECStatus rv; > ^ >pcertdb.c: In function 'UpdateV5DB': >pcertdb.c:3796:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] > SECStatus rv; > ^ >pcertdb.c: In function 'nsslowcert_FindCrlByKey': >pcertdb.c:5075:9: warning: variable 'key' set but not used [-Wunused-but-set-variable] > DBT key; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11db.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11db.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssdbm.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssdbm.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dbmshim.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/keydb.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lgattr.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lgcreate.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lgdestroy.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lgfind.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lginit.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lgutil.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lowcert.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lowkey.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pcertdb.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11db.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssdbm.a >grep -v ';-' nssdbm.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssdbm.def >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssdbm3.so >gcc -shared -m64 -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnssdbm3.so -Wl,--version-script,Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssdbm.def -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssdbm3.so Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dbmshim.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/keydb.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lgattr.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lgcreate.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lgdestroy.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lgfind.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lginit.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lgutil.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lowcert.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lowkey.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pcertdb.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11db.o ../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a -L../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -L../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >chmod +x Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssdbm3.so >../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssdbm.a ../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssdbm3.so ../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken/legacydb' >make: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken' >+ tar cf build_these_later.tar ./mozilla/security/nss/cmd/bltest ./mozilla/security/nss/cmd/fipstest >+ rm -rf ./mozilla/security/nss/cmd/bltest >+ rm -rf ./mozilla/security/nss/cmd/fipstest >+ NSS_ENABLE_ECC=1 >+ export NSS_ENABLE_ECC >+ NSS_ECC_MORE_THAN_SUITE_B=1 >+ export NSS_ECC_MORE_THAN_SUITE_B >+ /usr/bin/make -C ./mozilla/security/coreconf >make: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/coreconf' >cd nsinstall; /usr/bin/make export >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/coreconf/nsinstall' >make[1]: Nothing to be done for `export'. >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/coreconf/nsinstall' >cd nsinstall; /usr/bin/make libs >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/coreconf/nsinstall' >true -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall ../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/coreconf/nsinstall' >make: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/coreconf' >+ /usr/bin/make -C ./mozilla/security/dbm >make: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm' >cd include; /usr/bin/make export >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm/include' >../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ../../../dbm/include/cdefs.h ../../../dbm/include/mcom_db.h ../../../dbm/include/ncompat.h ../../../dbm/include/winfile.h ../../../dist/public/dbm >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm/include' >cd src; /usr/bin/make export >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm/src' >make[1]: Nothing to be done for `export'. >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm/src' >cd include; /usr/bin/make libs >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm/include' >make[1]: Nothing to be done for `libs'. >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm/include' >cd src; /usr/bin/make libs >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm/src' >../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libdbm.a ../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm/src' >make: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/dbm' >+ /usr/bin/make -C ./mozilla/security/nss >make: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss' >cd lib; /usr/bin/make export >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib' >cd util; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/util' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 base64.h ciferfam.h hasht.h nssb64.h nssb64t.h nsslocks.h nssilock.h nssilckt.h nssrwlk.h nssrwlkt.h nssutil.h pkcs11.h pkcs11f.h pkcs11p.h pkcs11t.h pkcs11n.h pkcs11u.h portreg.h secasn1.h secasn1t.h seccomon.h secder.h secdert.h secdig.h secdigt.h secitem.h secoid.h secoidt.h secport.h secerr.h utilmodt.h utilrename.h utilpars.h utilparst.h ../../../../dist/public/nss >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 templates.c ../../../../dist/private/nss >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/util' >cd freebl; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/freebl' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 blapit.h shsign.h ecl/ecl-exp.h ../../../../dist/public/nss >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 alghmac.h blapi.h hmacct.h secmpi.h secrng.h ec.h ecl/ecl.h ecl/ecl-curve.h ../../../../dist/private/nss >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/freebl' >cd softoken; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken' >cd legacydb; /usr/bin/make export >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken/legacydb' >There are no private exports. >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken/legacydb' >cd legacydb; /usr/bin/make private_export >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken/legacydb' >There are no private exports. >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken/legacydb' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 lgglue.h lowkeyi.h lowkeyti.h pkcs11ni.h softoken.h softoknt.h softkver.h sdb.h sftkdbt.h ../../../../dist/private/nss >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken' >cd base; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/base' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h ../../../../dist/public/nss >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 baset.h base.h ../../../../dist/private/nss >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/base' >cd dev; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/dev' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h ../../../../dist/private/nss >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/dev' >cd pki; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/pki' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h ../../../../dist/private/nss >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/pki' >cd libpkix; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix' >cd include; /usr/bin/make export >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/include' >../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/include' >cd pkix; /usr/bin/make export >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix' >cd certsel; /usr/bin/make export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/certsel' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/certsel' >cd crlsel; /usr/bin/make export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' >cd checker; /usr/bin/make export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/checker' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/checker' >cd params; /usr/bin/make export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/params' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/params' >cd results; /usr/bin/make export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/results' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/results' >cd store; /usr/bin/make export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/store' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/store' >cd top; /usr/bin/make export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/top' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/top' >cd util; /usr/bin/make export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/util' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/util' >cd certsel; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/certsel' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/certsel' >cd crlsel; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' >cd checker; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/checker' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/checker' >cd params; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/params' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/params' >cd results; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/results' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/results' >cd store; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/store' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/store' >cd top; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/top' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/top' >cd util; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/util' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/util' >There are no private exports. >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix' >cd pkix_pl_nss; /usr/bin/make export >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' >cd pki; /usr/bin/make export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' >cd system; /usr/bin/make export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' >cd module; /usr/bin/make export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' >cd pki; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' >cd system; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' >cd module; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' >There are no private exports. >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' >cd include; /usr/bin/make private_export >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/include' >../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/include' >cd pkix; /usr/bin/make private_export >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix' >cd certsel; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/certsel' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/certsel' >cd crlsel; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' >cd checker; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/checker' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/checker' >cd params; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/params' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/params' >cd results; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/results' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/results' >cd store; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/store' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/store' >cd top; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/top' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/top' >cd util; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/util' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/util' >There are no private exports. >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix' >cd pkix_pl_nss; /usr/bin/make private_export >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' >cd pki; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' >cd system; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' >cd module; /usr/bin/make private_export >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' >There are no private exports. >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' >There are no private exports. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix' >cd certdb; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/certdb' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h ../../../../dist/public/nss >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h ../../../../dist/private/nss >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/certdb' >cd certhigh; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/certhigh' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h ../../../../dist/public/nss >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h ../../../../dist/private/nss >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/certhigh' >cd pk11wrap; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/pk11wrap' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmod.h secmodt.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h ../../../../dist/public/nss >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h ../../../../dist/private/nss >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/pk11wrap' >cd cryptohi; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/cryptohi' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h sechash.h ../../../../dist/public/nss >There are no private exports. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/cryptohi' >cd nss; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/nss' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../../dist/public/nss >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssrenam.h ../../../../dist/private/nss >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/nss' >cd ssl; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ssl' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h ../../../../dist/public/nss >There are no private exports. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ssl' >cd pkcs12; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/pkcs12' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h ../../../../dist/public/nss >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/pkcs12' >cd pkcs7; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/pkcs7' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h ../../../../dist/public/nss >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/pkcs7' >cd smime; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/smime' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h ../../../../dist/public/nss >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/smime' >cd crmf; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/crmf' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h ../../../../dist/public/nss >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h ../../../../dist/private/nss >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/crmf' >cd jar; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/jar' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h ../../../../dist/public/nss >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/jar' >cd ckfw; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ckfw' >cd builtins; /usr/bin/make export >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ckfw/builtins' >../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../../dist/public/nss >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ckfw/builtins' >cd pem; /usr/bin/make export >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ckfw/pem' >../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nsspem.h ../../../../../dist/public/nss >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ckfw/pem' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h ../../../../dist/public/nss >cd builtins; /usr/bin/make private_export >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ckfw/builtins' >There are no private exports. >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ckfw/builtins' >cd pem; /usr/bin/make private_export >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ckfw/pem' >There are no private exports. >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ckfw/pem' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h ../../../../dist/private/nss >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ckfw' >cd sysinit; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/sysinit' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/sysinit' >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib' >cd cmd; /usr/bin/make export >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd' >cd lib; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/lib' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 basicutil.h secutil.h pk11table.h ../../../../dist/private/nss >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/lib' >cd addbuiltin; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/addbuiltin' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/addbuiltin' >cd atob; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/atob' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/atob' >cd btoa; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/btoa' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/btoa' >cd certcgi; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/certcgi' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/certcgi' >cd certutil; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/certutil' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/certutil' >cd checkcert; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/checkcert' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/checkcert' >cd chktest; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/chktest' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/chktest' >cd crlutil; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/crlutil' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/crlutil' >cd crmftest; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/crmftest' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/crmftest' >cd dbtest; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/dbtest' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/dbtest' >cd derdump; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/derdump' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/derdump' >cd digest; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/digest' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/digest' >cd httpserv; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/httpserv' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/httpserv' >cd listsuites; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/listsuites' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/listsuites' >cd makepqg; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/makepqg' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/makepqg' >cd multinit; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/multinit' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/multinit' >cd ocspclnt; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/ocspclnt' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/ocspclnt' >cd ocspresp; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/ocspresp' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/ocspresp' >cd oidcalc; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/oidcalc' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/oidcalc' >cd p7content; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/p7content' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/p7content' >cd p7env; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/p7env' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/p7env' >cd p7sign; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/p7sign' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/p7sign' >cd p7verify; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/p7verify' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/p7verify' >cd pk12util; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pk12util' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pk12util' >cd pk11mode; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pk11mode' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pk11mode' >cd pk1sign; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pk1sign' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pk1sign' >cd pkix-errcodes; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pkix-errcodes' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pkix-errcodes' >cd pp; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pp' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pp' >cd pwdecrypt; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pwdecrypt' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pwdecrypt' >cd rsaperf; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/rsaperf' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/rsaperf' >cd sdrtest; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/sdrtest' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/sdrtest' >cd selfserv; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/selfserv' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/selfserv' >cd signtool; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/signtool' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/signtool' >cd signver; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/signver' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/signver' >cd shlibsign; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign' >cd mangle; /usr/bin/make export >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/mangle' >make[3]: Nothing to be done for `export'. >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/mangle' >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign' >cd smimetools; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/smimetools' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/smimetools' >cd ssltap; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/ssltap' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/ssltap' >cd strsclnt; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/strsclnt' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/strsclnt' >cd symkeyutil; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/symkeyutil' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/symkeyutil' >cd tests; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/tests' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/tests' >cd tstclnt; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/tstclnt' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/tstclnt' >cd vfychain; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/vfychain' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/vfychain' >cd vfyserv; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/vfyserv' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/vfyserv' >cd modutil; /usr/bin/make export >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/modutil' >make[2]: Nothing to be done for `export'. >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/modutil' >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd' >cd lib; /usr/bin/make libs >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib' >cd util; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/util' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssutil.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssutil3.so ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/util' >cd freebl; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/freebl' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libfreebl.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >/usr/bin/make FREEBL_CHILD_BUILD=1 \ > OBJDIR=Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB libs >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/freebl' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecl.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ecl.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ecl_curve.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ecl_mult.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ecl_gf.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ecp_aff.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ecp_jac.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ecp_mont.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec_naf.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ec_naf.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ecp_jm.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_aff.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ec2_aff.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_mont.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ec2_mont.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_proj.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ec2_proj.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_163.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ec2_163.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_193.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ec2_193.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_233.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ec2_233.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_192.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ecp_192.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_224.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ecp_224.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ecp_256.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_384.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ecp_384.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_521.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ecl/ecp_521.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so >gcc -shared -m64 -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libfreebl3.so -Wl,--version-script,Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def -Wl,-Bsymbolic -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/des.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/cts.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ctr.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/gcm.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/hmacct.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecl.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec_naf.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_aff.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_mont.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_proj.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_163.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_193.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_233.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_192.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_224.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_384.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_521.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o -ldl -lc >chmod +x Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/freebl' >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/freebl' >cd softoken; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken' >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsoftokn.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsoftokn3.so ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >cd legacydb; /usr/bin/make libs >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken/legacydb' >../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssdbm.a ../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssdbm3.so ../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken/legacydb' >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/softoken' >cd base; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/base' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/arena.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 arena.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/error.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 error.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/errorval.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 errorval.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/hashops.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 hashops.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libc.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 libc.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/tracker.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 tracker.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/item.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 item.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/utf8.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 utf8.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/list.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 list.c >list.c: In function 'nssList_Add': >list.c:224:14: warning: variable 'nssrv' set but not used [-Wunused-but-set-variable] > PRStatus nssrv; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/hash.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 hash.c >hash.c: In function 'nss_identity_hash': >hash.c:58:16: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > PRUint32 i = (PRUint32)key; > ^ >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssb.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssb.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/arena.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/error.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/errorval.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/hashops.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libc.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/tracker.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/item.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/utf8.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/list.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/hash.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssb.a >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssb.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/base' >cd dev; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/dev' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/devslot.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 devslot.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/devtoken.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 devtoken.c >devtoken.c: In function 'nssToken_TraverseCertificates': >devtoken.c:1473:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] > PRStatus status; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/devutil.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 devutil.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ckhelper.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ckhelper.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssdev.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssdev.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/devslot.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/devtoken.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/devutil.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ckhelper.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssdev.a >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssdev.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/dev' >cd pki; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/pki' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/asymmkey.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 asymmkey.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certificate.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 certificate.c >certificate.c: In function 'nssCertificateList_DoCallback': >certificate.c:902:14: warning: variable 'nssrv' set but not used [-Wunused-but-set-variable] > PRStatus nssrv; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cryptocontext.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cryptocontext.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/symmkey.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 symmkey.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/trustdomain.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 trustdomain.c >trustdomain.c: In function 'NSSTrustDomain_TraverseCertificates': >trustdomain.c:1002:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] > PRStatus status = PR_FAILURE; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/tdcache.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 tdcache.c >tdcache.c: In function 'merge_object_instances': >tdcache.c:704:49: warning: comparison between 'PRStatus' and 'enum _SECStatus' [-Wenum-compare] > if (nssPKIObject_AddInstance(to, instance) == SECSuccess) { > ^ >tdcache.c: In function 'add_cert_to_cache': >tdcache.c:776:9: warning: variable 'handle' set but not used [-Wunused-but-set-variable] > PRBool handle = PR_FALSE; > ^ >tdcache.c: In function 'nssTrustDomain_RemoveCertFromCacheLOCKED': >tdcache.c:276:16: warning: 'nickname' may be used uninitialized in this function [-Wmaybe-uninitialized] > nssHash_Remove(cache->nickname, nickname); > ^ >tdcache.c:336:14: note: 'nickname' was declared here > NSSUTF8 *nickname; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certdecode.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 certdecode.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkistore.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkistore.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkibase.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkibase.c >pkibase.c: In function 'nssPKIObjectCollection_Traverse': >pkibase.c:910:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] > PRStatus status; > ^ >pkibase.c: In function 'nssCertificateCollection_Create': >pkibase.c:1064:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] > PRStatus status; > ^ >pkibase.c: In function 'nssCRLCollection_Create': >pkibase.c:1171:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] > PRStatus status; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pki3hack.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pki3hack.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnsspki.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnsspki.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/asymmkey.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certificate.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cryptocontext.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/symmkey.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/trustdomain.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/tdcache.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certdecode.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkistore.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkibase.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pki3hack.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnsspki.a >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnsspki.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/pki' >cd libpkix; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix' >cd include; /usr/bin/make libs >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/include' >make[3]: Nothing to be done for `libs'. >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/include' >cd pkix; /usr/bin/make libs >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix' >cd certsel; /usr/bin/make libs >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/certsel' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_certselector.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_certselector.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_comcertselparams.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_comcertselparams.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_certselector.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_comcertselparams.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a ../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/certsel' >cd crlsel; /usr/bin/make libs >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_crlselector.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_crlselector.c >pkix_crlselector.c: In function 'pkix_CRLSelector_Hashcode': >pkix_crlselector.c:193:22: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > hash = 31 * ((PKIX_UInt32)crlSelector->matchCallback + > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_comcrlselparams.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_comcrlselparams.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_crlselector.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_comcrlselparams.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a ../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' >cd checker; /usr/bin/make libs >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/checker' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_basicconstraintschecker.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_basicconstraintschecker.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_certchainchecker.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_certchainchecker.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_crlchecker.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_crlchecker.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_ekuchecker.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_ekuchecker.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_expirationchecker.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_expirationchecker.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_namechainingchecker.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_namechainingchecker.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_nameconstraintschecker.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_nameconstraintschecker.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_ocspchecker.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_ocspchecker.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_revocationmethod.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_revocationmethod.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_revocationchecker.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_revocationchecker.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_policychecker.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_policychecker.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_signaturechecker.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_signaturechecker.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_targetcertchecker.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_targetcertchecker.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixchecker.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixchecker.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_basicconstraintschecker.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_certchainchecker.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_crlchecker.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_ekuchecker.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_expirationchecker.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_namechainingchecker.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_nameconstraintschecker.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_ocspchecker.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_revocationmethod.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_revocationchecker.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_policychecker.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_signaturechecker.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_targetcertchecker.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixchecker.a >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixchecker.a ../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/checker' >cd params; /usr/bin/make libs >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/params' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_trustanchor.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_trustanchor.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_procparams.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_procparams.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_valparams.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_valparams.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_resourcelimits.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_resourcelimits.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixparams.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixparams.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_trustanchor.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_procparams.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_valparams.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_resourcelimits.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixparams.a >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixparams.a ../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/params' >cd results; /usr/bin/make libs >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/results' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_buildresult.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_buildresult.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_policynode.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_policynode.c >pkix_policynode.c: In function 'pkix_PolicyNode_Hashcode': >pkix_policynode.c:827:34: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > nodeHash = 31*nodeHash + (PKIX_UInt32)(node->parent); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_valresult.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_valresult.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_verifynode.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_verifynode.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixresults.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixresults.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_buildresult.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_policynode.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_valresult.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_verifynode.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixresults.a >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixresults.a ../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/results' >cd store; /usr/bin/make libs >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/store' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_store.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_store.c >pkix_store.c: In function 'pkix_CertStore_Hashcode': >pkix_store.c:77:22: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > *pHashcode = (PKIX_UInt32) certStore->certCallback + > ^ >pkix_store.c:78:22: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > (PKIX_UInt32) certStore->crlCallback + > ^ >pkix_store.c:79:22: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > (PKIX_UInt32) certStore->certContinue + > ^ >pkix_store.c:80:22: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > (PKIX_UInt32) certStore->crlContinue + > ^ >pkix_store.c:81:22: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > (PKIX_UInt32) certStore->trustCallback + > ^ >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixstore.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixstore.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_store.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixstore.a >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixstore.a ../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/store' >cd top; /usr/bin/make libs >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/top' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_validate.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_validate.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_lifecycle.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_lifecycle.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_build.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_build.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixtop.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixtop.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_validate.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_lifecycle.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_build.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixtop.a >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixtop.a ../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/top' >cd util; /usr/bin/make libs >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/util' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_tools.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_tools.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_error.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_error.c >pkix_error.c: In function 'pkix_Error_Hashcode': >pkix_error.c:328:20: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > *pResult = (PKIX_UInt32)object; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_logger.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_logger.c >pkix_logger.c: In function 'pkix_Logger_Hashcode': >pkix_logger.c:495:20: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > hash = (((((PKIX_UInt32) logger->callback + tempHash) << 7) + > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_list.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_list.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_errpaths.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_errpaths.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixutil.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixutil.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_tools.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_error.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_logger.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_list.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_errpaths.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixutil.a >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixutil.a ../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix/util' >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix' >cd pkix_pl_nss; /usr/bin/make libs >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' >cd pki; /usr/bin/make libs >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_basicconstraints.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_basicconstraints.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_cert.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_cert.c >pkix_pl_cert.c: In function 'PKIX_PL_Cert_Create': >pkix_pl_cert.c:1518:22: warning: variable 'copyDER' set but not used [-Wunused-but-set-variable] > PKIX_Boolean copyDER; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_certpolicyinfo.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicymap.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_certpolicymap.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_certpolicyqualifier.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_crl.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_crl.c >pkix_pl_crl.c: In function 'pkix_pl_CRL_ToString': >pkix_pl_crl.c:456:21: warning: 'crlVersion' may be used uninitialized in this function [-Wmaybe-uninitialized] > (&crlString, > ^ >pkix_pl_crl.c:354:21: note: 'crlVersion' was declared here > PKIX_UInt32 crlVersion; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_crldp.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_crldp.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_crlentry.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_crlentry.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_date.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_date.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_generalname.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_generalname.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_infoaccess.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_infoaccess.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_nameconstraints.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_nameconstraints.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocsprequest.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_ocsprequest.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspresponse.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_ocspresponse.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_publickey.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_publickey.c >pkix_pl_publickey.c: In function 'pkix_pl_PublicKey_Hashcode': >pkix_pl_publickey.c:214:21: warning: variable 'fullHash' set but not used [-Wunused-but-set-variable] > PKIX_UInt32 fullHash; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_x500name.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_x500name.c >pkix_pl_x500name.c:37:1: warning: 'pkix_pl_X500Name_ToString_Helper' defined but not used [-Wunused-function] > pkix_pl_X500Name_ToString_Helper( > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspcertid.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_ocspcertid.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixpki.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixpki.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_basicconstraints.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_cert.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicymap.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_crl.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_crldp.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_crlentry.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_date.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_generalname.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_infoaccess.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_nameconstraints.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocsprequest.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspresponse.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_publickey.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_x500name.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspcertid.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixpki.a >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixpki.a ../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' >cd system; /usr/bin/make libs >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_bigint.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_bigint.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_bytearray.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_bytearray.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_common.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_common.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_error.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_error.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_hashtable.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_hashtable.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_lifecycle.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_lifecycle.c >pkix_pl_lifecycle.c: In function 'PKIX_PL_Shutdown': >pkix_pl_lifecycle.c:246:21: warning: variable 'numLeakedObjects' set but not used [-Wunused-but-set-variable] > PKIX_UInt32 numLeakedObjects = 0; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_mem.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_mem.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_monitorlock.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_monitorlock.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_mutex.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_mutex.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_object.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_object.c >pkix_pl_object.c: In function 'pkix_pl_Object_Hashcode_Default': >pkix_pl_object.c:374:19: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > *pValue = (PKIX_UInt32)object; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_oid.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_oid.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_primhash.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_primhash.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_rwlock.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_rwlock.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_string.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_string.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixsystem.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixsystem.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_bigint.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_bytearray.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_common.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_error.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_hashtable.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_lifecycle.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_mem.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_monitorlock.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_mutex.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_object.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_oid.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_primhash.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_rwlock.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_string.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixsystem.a >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixsystem.a ../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' >cd module; /usr/bin/make libs >make[4]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_aiamgr.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_aiamgr.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_colcertstore.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_colcertstore.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpcertstore.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_httpcertstore.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_httpdefaultclient.c >pkix_pl_httpdefaultclient.c: In function 'pkix_pl_HttpDefaultClient_KeepAliveSession': >pkix_pl_httpdefaultclient.c:1135:36: warning: variable 'client' set but not used [-Wunused-but-set-variable] > PKIX_PL_HttpDefaultClient *client = NULL; > ^ >pkix_pl_httpdefaultclient.c: In function 'pkix_pl_HttpDefaultClient_Cancel': >pkix_pl_httpdefaultclient.c:1487:36: warning: variable 'client' set but not used [-Wunused-but-set-variable] > PKIX_PL_HttpDefaultClient *client = NULL; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaptemplates.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_ldaptemplates.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapcertstore.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_ldapcertstore.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapresponse.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_ldapresponse.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaprequest.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_ldaprequest.c >pkix_pl_ldaprequest.c: In function 'pkix_pl_LdapRequest_Destroy': >pkix_pl_ldaprequest.c:266:30: warning: variable 'ldapRq' set but not used [-Wunused-but-set-variable] > PKIX_PL_LdapRequest *ldapRq = NULL; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_ldapdefaultclient.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_nsscontext.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_nsscontext.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_pk11certstore.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_pk11certstore.c >pkix_pl_pk11certstore.c: In function 'NameCacheHasFetchedCrlInfo': >pkix_pl_pk11certstore.c:382:22: warning: variable 'cert' set but not used [-Wunused-but-set-variable] > CERTCertificate *cert; > ^ >pkix_pl_pk11certstore.c: In function 'DownloadCrl': >pkix_pl_pk11certstore.c:782:16: warning: variable 'savedError' set but not used [-Wunused-but-set-variable] > PKIX_Int32 savedError = -1; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_socket.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix_pl_socket.c >pkix_pl_socket.c: In function 'pkix_pl_socket_timestamp': >pkix_pl_socket.c:65:9: warning: format '%lld' expects argument of type 'long long int', but argument 2 has type 'PRInt64' [-Wformat=] > printf("%lld:\n", prTime); > ^ >pkix_pl_socket.c: In function 'pkix_pl_socket_traceLine': >pkix_pl_socket.c:143:35: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > pkix_pl_socket_linePrefix((PKIX_UInt32)ptr); > ^ >pkix_pl_socket.c: In function 'pkix_pl_socket_tracePartialLine': >pkix_pl_socket.c:187:43: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > pkix_pl_socket_linePrefix((PKIX_UInt32)ptr); > ^ >pkix_pl_socket.c: In function 'pkix_pl_socket_tracebuff': >pkix_pl_socket.c:246:43: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > pkix_pl_socket_linePrefix((PKIX_UInt32)buf); > ^ >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixmodule.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixmodule.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_aiamgr.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_colcertstore.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpcertstore.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaptemplates.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapcertstore.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapresponse.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaprequest.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_nsscontext.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_pk11certstore.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_socket.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixmodule.a >../../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkixmodule.a ../../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[4]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/libpkix' >cd certdb; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/certdb' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/alg1485.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 alg1485.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certdb.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 certdb.c >certdb.c: In function 'cert_VerifySubjectAltName': >certdb.c:1426:23: warning: variable 'hnLen' set but not used [-Wunused-but-set-variable] > unsigned int hnLen; > ^ >certdb.c: In function 'CERT_ImportCerts': >certdb.c:2438:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] > SECStatus rv; > ^ >certdb.c: In function 'CERT_UnlockCertRefCount': >certdb.c:2888:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] > PRStatus prstat; > ^ >certdb.c: In function 'CERT_UnlockCertTrust': >certdb.c:2968:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] > PRStatus prstat; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certv3.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 certv3.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certxutl.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 certxutl.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crl.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 crl.c >crl.c: In function 'crl_storeCRL': >crl.c:632:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] > SECStatus rv; > ^ >crl.c: In function 'cert_CheckCertRevocationStatus': >crl.c:2634:25: warning: comparison between 'enum _SECStatus' and 'SECCertTimeValidity' [-Wenum-compare] > if (t && SECSuccess != CERT_CheckCertValidTimes(issuer, t, PR_FALSE)) > ^ >crl.c:2690:27: warning: unused variable 'rv2' [-Wunused-variable] > SECStatus rv2 = CERT_FindCRLEntryReasonExten(entry, &reason); > ^ >crl.c: In function 'cert_CacheCRLByGeneralName': >crl.c:3047:32: warning: variable 'rv2' set but not used [-Wunused-but-set-variable] > SECStatus rv = SECSuccess, rv2; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/genname.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 genname.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/stanpcertdb.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 stanpcertdb.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/polcyxtn.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 polcyxtn.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secname.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 secname.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/xauthkid.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 xauthkid.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/xbsconst.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 xbsconst.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/xconst.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 xconst.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libcertdb.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libcertdb.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/alg1485.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certdb.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certv3.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certxutl.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crl.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/genname.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/stanpcertdb.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/polcyxtn.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secname.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/xauthkid.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/xbsconst.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/xconst.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libcertdb.a >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libcertdb.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/certdb' >cd certhigh; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/certhigh' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certhtml.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 certhtml.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certreq.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 certreq.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crlv2.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 crlv2.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ocsp.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ocsp.c >ocsp.c: In function 'ocsp_RemoveCacheItem': >ocsp.c:564:12: warning: variable 'couldRemoveFromHashTable' set but not used [-Wunused-but-set-variable] > PRBool couldRemoveFromHashTable; > ^ >ocsp.c: In function 'CERT_EncodeOCSPRequest': >ocsp.c:1437:21: warning: variable 'tbsRequest' set but not used [-Wunused-but-set-variable] > ocspTBSRequest *tbsRequest; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ocspsig.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ocspsig.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certhigh.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 certhigh.c >certhigh.c: In function 'CERT_MatchNickname': >certhigh.c:28:9: warning: variable 'len' set but not used [-Wunused-but-set-variable] > int len; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certvfy.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 certvfy.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certvfypkix.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 certvfypkix.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certvfypkixprint.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 certvfypkixprint.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/xcrldist.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 xcrldist.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libcerthi.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libcerthi.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certhtml.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certreq.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crlv2.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ocsp.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ocspsig.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certhigh.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certvfy.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certvfypkix.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certvfypkixprint.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/xcrldist.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libcerthi.a >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libcerthi.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/certhigh' >cd pk11wrap; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/pk11wrap' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dev3hack.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 dev3hack.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11akey.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11akey.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11auth.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11auth.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11cert.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11cert.c >pk11cert.c: In function 'pk11_fastCert': >pk11cert.c:231:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] > PRStatus status; > ^ >pk11cert.c: In function 'PK11_MakeCertFromHandle': >pk11cert.c:297:12: warning: variable 'swapNickname' set but not used [-Wunused-but-set-variable] > PRBool swapNickname = PR_FALSE; > ^ >pk11cert.c:296:12: warning: variable 'isFortezzaRootCA' set but not used [-Wunused-but-set-variable] > PRBool isFortezzaRootCA = PR_FALSE; > ^ >pk11cert.c: In function 'PK11_TraverseCertsForNicknameInSlot': >pk11cert.c:2007:28: warning: variable 'pk11cb' set but not used [-Wunused-but-set-variable] > struct nss3_cert_cbstr pk11cb; > ^ >pk11cert.c: In function 'PK11_FindCertFromDERCertItem': >pk11cert.c:2151:21: warning: unused variable 'td' [-Wunused-variable] > NSSTrustDomain *td = STAN_GetDefaultTrustDomain(); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11cxt.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11cxt.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11err.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11err.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11kea.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11kea.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11list.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11list.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11load.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11load.c >pk11load.c: In function 'SECMOD_UnloadModule': >pk11load.c:569:28: warning: unused variable 'status' [-Wunused-variable] > PRStatus status = PR_UnloadLibrary(softokenLib); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11mech.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11mech.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11merge.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11merge.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11nobj.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11nobj.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11obj.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11obj.c >pk11obj.c: In function 'PK11_MatchItem': >pk11obj.c:1649:22: warning: variable 'parent' set but not used [-Wunused-but-set-variable] > CK_OBJECT_HANDLE parent; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11pars.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11pars.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11pbe.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11pbe.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11pk12.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11pk12.c >pk11pk12.c: In function 'PK11_ImportPrivateKeyInfoAndReturnKey': >pk11pk12.c:424:17: warning: variable 'keyType' set but not used [-Wunused-but-set-variable] > CK_KEY_TYPE keyType = CKK_RSA; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11pqg.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11pqg.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11sdr.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11sdr.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11skey.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11skey.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11slot.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11slot.c >pk11slot.c: In function 'PK11_InitToken': >pk11slot.c:1101:11: warning: variable 'tmp' set but not used [-Wunused-but-set-variable] > char *tmp; > ^ >pk11slot.c: In function 'PK11_InitSlot': >pk11slot.c:1345:11: warning: variable 'tmp' set but not used [-Wunused-but-set-variable] > char *tmp; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11util.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11util.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpk11wrap.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpk11wrap.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dev3hack.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11akey.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11auth.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11cert.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11cxt.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11err.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11kea.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11list.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11load.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11mech.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11merge.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11nobj.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11obj.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11pars.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11pbe.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11pk12.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11pqg.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11sdr.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11skey.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11slot.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11util.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpk11wrap.a >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpk11wrap.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/pk11wrap' >cd cryptohi; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/cryptohi' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sechash.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sechash.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/seckey.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 seckey.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secsign.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 secsign.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secvfy.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 secvfy.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dsautil.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 dsautil.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libcryptohi.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libcryptohi.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sechash.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/seckey.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secsign.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secvfy.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dsautil.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libcryptohi.a >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libcryptohi.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/cryptohi' >cd nss; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/nss' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssinit.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 nssinit.c >nssinit.c: In function 'NSS_VersionCheck': >nssinit.c:1251:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] > volatile char c; /* force a reference that won't get optimized away */ > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssver.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 nssver.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/utilwrap.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 utilwrap.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnss.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnss.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssinit.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssver.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/utilwrap.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnss.a >grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nss.def >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnss3.so >gcc -shared -m64 -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnss3.so -Wl,--version-script,Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nss.def -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnss3.so Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssinit.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssver.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/utilwrap.o ../certhigh/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certhtml.o ../certhigh/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certreq.o ../certhigh/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crlv2.o ../certhigh/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ocsp.o ../certhigh/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ocspsig.o ../certhigh/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certhigh.o ../certhigh/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certvfy.o ../certhigh/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certvfypkix.o ../certhigh/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certvfypkixprint.o ../certhigh/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/xcrldist.o ../cryptohi/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sechash.o ../cryptohi/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/seckey.o ../cryptohi/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secsign.o ../cryptohi/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secvfy.o ../cryptohi/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dsautil.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dev3hack.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11akey.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11auth.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11cert.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11err.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11kea.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11list.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11load.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11mech.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11merge.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11obj.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11pars.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11skey.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11slot.o ../pk11wrap/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11util.o ../certdb/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/alg1485.o ../certdb/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certdb.o ../certdb/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certv3.o ../certdb/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certxutl.o ../certdb/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crl.o ../certdb/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/genname.o ../certdb/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/stanpcertdb.o ../certdb/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/polcyxtn.o ../certdb/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secname.o ../certdb/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/xauthkid.o ../certdb/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/xbsconst.o ../certdb/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/xconst.o ../pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/asymmkey.o ../pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certificate.o ../pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cryptocontext.o ../pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/symmkey.o ../pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/trustdomain.o ../pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/tdcache.o ../pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certdecode.o ../pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkistore.o ../pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkibase.o ../pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pki3hack.o ../dev/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/devslot.o ../dev/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/devtoken.o ../dev/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/devutil.o ../dev/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ckhelper.o ../base/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/arena.o ../base/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/error.o ../base/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/errorval.o ../base/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/hashops.o ../base/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libc.o ../base/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/tracker.o ../base/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/item.o ../base/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/utf8.o ../base/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/list.o ../base/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix_pl_socket.o -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >chmod +x Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnss3.so >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnss.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnss3.so ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/nss' >cd ssl; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ssl' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/derive.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 derive.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dtlscon.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 dtlscon.c >dtlscon.c: In function 'ssl3_DisableNonDTLSSuites': >dtlscon.c:92:12: warning: unused variable 'rv' [-Wunused-variable] > SECStatus rv = ssl3_CipherPrefSet(ss, *suite, PR_FALSE); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/prelib.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 prelib.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssl3con.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ssl3con.c >ssl3con.c: In function 'ssl3_IllegalParameter': >ssl3con.c:2863:12: warning: variable 'isTLS' set but not used [-Wunused-but-set-variable] > PRBool isTLS; > ^ >ssl3con.c: In function 'ssl3_HandleRSAClientKeyExchange': >ssl3con.c:7982:23: warning: variable 'pmsItem' set but not used [-Wunused-but-set-variable] > SECItem pmsItem = {siBuffer, NULL, 0}; > ^ >ssl3con.c:7978:23: warning: variable 'isTLS' set but not used [-Wunused-but-set-variable] > PRBool isTLS = PR_FALSE; > ^ >ssl3con.c: In function 'ssl3_RecordKeyLog': >ssl3con.c:8910:19: warning: variable 'sid' set but not used [-Wunused-but-set-variable] > sslSessionID *sid; > ^ >ssl3con.c: In function 'ssl3_HandleRecord': >ssl3con.c:10123:21: warning: 'dtls_seq_num' may be used uninitialized in this function [-Wmaybe-uninitialized] > dtls_RecordSetRecvd(&crSpec->recvdRecords, dtls_seq_num); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssl3gthr.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ssl3gthr.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslauth.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sslauth.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslcon.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sslcon.c >sslcon.c: In function 'ssl2_HandleMessage': >sslcon.c:2498:22: warning: variable 'rv2' set but not used [-Wunused-but-set-variable] > int rv2; > ^ >sslcon.c: In function 'NSSSSL_VersionCheck': >sslcon.c:3687:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] > volatile char c; /* force a reference that won't get optimized away */ > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssldef.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ssldef.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslenum.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sslenum.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslerr.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sslerr.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslerrstrs.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sslerrstrs.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslinit.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sslinit.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssl3ext.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ssl3ext.c >ssl3ext.c: In function 'ssl3_HandleServerNameXtn': >ssl3ext.c:390:18: warning: variable 'type' set but not used [-Wunused-but-set-variable] > PRInt32 type; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslgathr.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sslgathr.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslmutex.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sslmutex.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslnonce.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sslnonce.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslreveal.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sslreveal.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslsecur.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sslsecur.c >sslsecur.c: In function 'ssl_SecureRecv': >sslsecur.c:1103:22: warning: variable 'sec' set but not used [-Wunused-but-set-variable] > sslSecurityInfo *sec; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslsnce.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sslsnce.c >sslsnce.c: In function 'InitCache': >sslsnce.c:1234:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->sidCacheLocks) += ptr; > ^ >sslsnce.c:1235:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->keyCacheLock ) += ptr; > ^ >sslsnce.c:1236:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->certCacheLock) += ptr; > ^ >sslsnce.c:1237:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->srvNameCacheLock) += ptr; > ^ >sslsnce.c:1238:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->sidCacheSets ) += ptr; > ^ >sslsnce.c:1239:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->sidCacheData ) += ptr; > ^ >sslsnce.c:1240:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->certCacheData) += ptr; > ^ >sslsnce.c:1241:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->keyCacheData ) += ptr; > ^ >sslsnce.c:1242:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->ticketKeyNameSuffix) += ptr; > ^ >sslsnce.c:1243:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->ticketEncKey ) += ptr; > ^ >sslsnce.c:1244:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->ticketMacKey ) += ptr; > ^ >sslsnce.c:1245:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->ticketKeysValid) += ptr; > ^ >sslsnce.c:1246:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->srvNameCacheData) += ptr; > ^ >sslsnce.c: In function 'SSL_InheritMPServerSIDCacheInstance': >sslsnce.c:1586:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->sidCacheLocks) += ptr; > ^ >sslsnce.c:1587:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->keyCacheLock ) += ptr; > ^ >sslsnce.c:1588:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->certCacheLock) += ptr; > ^ >sslsnce.c:1589:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->srvNameCacheLock) += ptr; > ^ >sslsnce.c:1590:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->sidCacheSets ) += ptr; > ^ >sslsnce.c:1591:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->sidCacheData ) += ptr; > ^ >sslsnce.c:1592:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->certCacheData) += ptr; > ^ >sslsnce.c:1593:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->keyCacheData ) += ptr; > ^ >sslsnce.c:1594:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->ticketKeyNameSuffix) += ptr; > ^ >sslsnce.c:1595:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->ticketEncKey ) += ptr; > ^ >sslsnce.c:1596:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->ticketMacKey ) += ptr; > ^ >sslsnce.c:1597:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->ticketKeysValid) += ptr; > ^ >sslsnce.c:1598:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] > *(ptrdiff_t *)(&cache->srvNameCacheData) += ptr; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslsock.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sslsock.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssltrace.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ssltrace.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslver.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sslver.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/authcert.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 authcert.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmpcert.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmpcert.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslinfo.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sslinfo.c >sslinfo.c: In function 'SSL_DisableDefaultExportCipherSuites': >sslinfo.c:239:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] > SECStatus rv; > ^ >sslinfo.c: In function 'SSL_DisableExportCipherSuites': >sslinfo.c:260:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] > SECStatus rv; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssl3ecc.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ssl3ecc.c >ssl3ecc.c: In function 'ssl3_DisableECCSuites': >ssl3ecc.c:902:12: warning: unused variable 'rv' [-Wunused-variable] > SECStatus rv = ssl3_CipherPrefSet(ss, *suite, PR_FALSE); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/unix_err.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 unix_err.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libssl.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libssl.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/derive.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dtlscon.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/prelib.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssl3con.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssl3gthr.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslauth.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslcon.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssldef.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslenum.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslerr.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslerrstrs.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslinit.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssl3ext.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslgathr.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslmutex.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslnonce.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslreveal.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslsecur.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslsnce.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslsock.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssltrace.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslver.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/authcert.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmpcert.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslinfo.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssl3ecc.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/unix_err.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libssl.a >grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssl.def >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libssl3.so >gcc -shared -m64 -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libssl3.so -Wl,--version-script,Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssl.def -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libssl3.so Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/derive.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dtlscon.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/prelib.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssl3con.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssl3gthr.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslauth.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslcon.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssldef.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslenum.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslerr.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslerrstrs.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslinit.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssl3ext.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslgathr.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslmutex.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslnonce.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslreveal.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslsecur.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslsnce.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslsock.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssltrace.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslver.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/authcert.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmpcert.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sslinfo.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssl3ecc.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/unix_err.o -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz >chmod +x Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libssl3.so >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libssl.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libssl3.so ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ssl' >cd pkcs12; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/pkcs12' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12local.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 p12local.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12creat.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 p12creat.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12dec.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 p12dec.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12plcy.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 p12plcy.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12tmpl.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 p12tmpl.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12e.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 p12e.c >p12e.c: In function 'sec_PKCS12CreateSafeBag': >p12e.c:698:12: warning: variable 'setName' set but not used [-Wunused-but-set-variable] > PRBool setName = PR_TRUE; > ^ >p12e.c: In function 'sec_pkcs12_encoder_start_context': >p12e.c:1535:12: warning: variable 'rv' set but not used [-Wunused-but-set-variable] > SECStatus rv; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12d.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 p12d.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkcs12.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkcs12.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12local.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12creat.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12dec.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12plcy.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12tmpl.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12e.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12d.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkcs12.a >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkcs12.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/pkcs12' >cd pkcs7; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/pkcs7' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certread.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 certread.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7common.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 p7common.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7create.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 p7create.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7decode.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 p7decode.c >p7decode.c: In function 'sec_pkcs7_verify_signature': >p7decode.c:1290:21: warning: variable 'crls' set but not used [-Wunused-but-set-variable] > CERTSignedCrl **crls; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7encode.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 p7encode.c >p7encode.c: In function 'sec_pkcs7_encoder_start_encrypt': >p7encode.c:64:18: warning: variable 'wincx' set but not used [-Wunused-but-set-variable] > void *mark, *wincx; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7local.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 p7local.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secmime.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 secmime.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkcs7.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkcs7.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certread.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7common.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7create.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7decode.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7encode.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7local.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secmime.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkcs7.a >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libpkcs7.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/pkcs7' >cd smime; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/smime' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsarray.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmsarray.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsasn1.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmsasn1.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsattr.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmsattr.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmscinfo.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmscinfo.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmscipher.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmscipher.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsdecode.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmsdecode.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsdigdata.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmsdigdata.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsdigest.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmsdigest.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsencdata.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmsencdata.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsencode.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmsencode.c >cmsencode.c: In function 'nss_cms_encoder_notify': >cmsencode.c:127:18: warning: variable 'poolp' set but not used [-Wunused-but-set-variable] > PLArenaPool *poolp; > ^ >cmsencode.c: In function 'nss_cms_before_data': >cmsencode.c:206:18: warning: variable 'poolp' set but not used [-Wunused-but-set-variable] > PLArenaPool *poolp; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsenvdata.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmsenvdata.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsmessage.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmsmessage.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmspubkey.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmspubkey.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsrecinfo.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmsrecinfo.c >cmsrecinfo.c: In function 'NSS_CMSRecipientInfo_UnwrapBulkKey': >cmsrecinfo.c:531:21: warning: variable 'encalg' set but not used [-Wunused-but-set-variable] > SECAlgorithmID *encalg; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsreclist.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmsreclist.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmssigdata.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmssigdata.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmssiginfo.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmssiginfo.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsudf.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmsudf.c >cmsudf.c: In function 'nss_cmstype_hash_key': >cmsudf.c:84:11: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > return (PLHashNumber) key; > ^ >cmsudf.c: In function 'nss_cmstype_compare_keys': >cmsudf.c:90:26: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > PLHashNumber value1 = (PLHashNumber) v1; > ^ >cmsudf.c:91:26: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > PLHashNumber value2 = (PLHashNumber) v2; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsutil.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmsutil.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/smimemessage.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 smimemessage.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/smimeutil.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 smimeutil.c >smimeutil.c: In function 'NSSSMIME_VersionCheck': >smimeutil.c:772:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] > volatile char c; /* force a reference that won't get optimized away */ > ^ >smimeutil.c: In function 'NSS_SMIMEUtil_FindBulkAlgForRecipients': >smimeutil.c:448:9: warning: 'key_type' may be used uninitialized in this function [-Wmaybe-uninitialized] > if (key_type == ecKey) { > ^ >smimeutil.c:427:14: note: 'key_type' was declared here > KeyType key_type; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/smimever.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 smimever.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsmime.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsmime.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsarray.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsasn1.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsattr.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmscinfo.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmscipher.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsdecode.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsdigdata.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsdigest.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsencdata.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsencode.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsenvdata.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsmessage.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmspubkey.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsrecinfo.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsreclist.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmssigdata.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmssiginfo.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsudf.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsutil.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/smimemessage.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/smimeutil.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/smimever.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsmime.a >grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/smime.def >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsmime3.so >gcc -shared -m64 -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libsmime3.so -Wl,--version-script,Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/smime.def -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsmime3.so Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsarray.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsasn1.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsattr.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmscinfo.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmscipher.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsdecode.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsdigdata.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsdigest.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsencdata.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsencode.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsenvdata.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsmessage.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmspubkey.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsrecinfo.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsreclist.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmssigdata.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmssiginfo.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsudf.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsutil.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/smimemessage.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/smimeutil.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/smimever.o ../pkcs12/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12local.o ../pkcs12/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12creat.o ../pkcs12/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12dec.o ../pkcs12/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12plcy.o ../pkcs12/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12tmpl.o ../pkcs12/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12e.o ../pkcs12/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p12d.o ../pkcs7/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certread.o ../pkcs7/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7common.o ../pkcs7/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7create.o ../pkcs7/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7decode.o ../pkcs7/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7encode.o ../pkcs7/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7local.o ../pkcs7/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secmime.o -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >chmod +x Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsmime3.so >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsmime.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsmime3.so ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/smime' >cd crmf; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/crmf' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crmfenc.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 crmfenc.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crmftmpl.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 crmftmpl.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crmfreq.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 crmfreq.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crmfpop.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 crmfpop.c >crmfpop.c: In function 'CRMF_CertReqMsgSetRAVerifiedPOP': >crmfpop.c:36:28: warning: variable 'dummy' set but not used [-Wunused-but-set-variable] > SECItem *dummy; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crmfdec.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 crmfdec.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crmfget.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 crmfget.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crmfcont.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 crmfcont.c >crmfcont.c: In function 'CRMF_CreateEncryptedKeyWithEncryptedValue': >crmfcont.c:860:31: warning: variable 'dummy' set but not used [-Wunused-but-set-variable] > CRMFEncryptedValue *dummy; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmmfasn1.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmmfasn1.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmmfresp.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmmfresp.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmmfrec.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmmfrec.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmmfchal.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmmfchal.c >cmmfchal.c: In function 'cmmf_create_witness_and_challenge': >cmmfchal.c:33:22: warning: variable 'id' set but not used [-Wunused-but-set-variable] > CK_OBJECT_HANDLE id; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/servget.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 servget.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/encutil.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 encutil.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/respcli.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 respcli.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/respcmn.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 respcmn.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/challcli.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 challcli.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/asn1cmn.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 asn1cmn.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libcrmf.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libcrmf.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crmfenc.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crmftmpl.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crmfreq.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crmfpop.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crmfdec.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crmfget.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crmfcont.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmmfasn1.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmmfresp.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmmfrec.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmmfchal.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/servget.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/encutil.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/respcli.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/respcmn.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/challcli.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/asn1cmn.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libcrmf.a >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libcrmf.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/crmf' >cd jar; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/jar' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/jarver.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 jarver.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/jarsign.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 jarsign.c >jarsign.c: In function 'jar_create_pk7': >jarsign.c:174:11: warning: variable 'errstring' set but not used [-Wunused-but-set-variable] > char *errstring; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/jar.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 jar.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/jar-ds.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 jar-ds.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/jarfile.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 jarfile.c >jarfile.c: In function 'jar_listtar': >jarfile.c:824:12: warning: variable 'when' set but not used [-Wunused-but-set-variable] > time_t when; > ^ >jarfile.c:823:14: warning: variable 'mode' set but not used [-Wunused-but-set-variable] > long sz, mode; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/jarint.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 jarint.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libjar.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libjar.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/jarver.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/jarsign.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/jar.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/jar-ds.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/jarfile.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/jarint.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libjar.a >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libjar.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/jar' >cd ckfw; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ckfw' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crypto.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 crypto.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/find.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 find.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/hash.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 hash.c >hash.c: In function 'nss_ckfw_identity_hash': >hash.c:55:16: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > PRUint32 i = (PRUint32)key; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/instance.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 instance.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/mutex.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 mutex.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/object.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 object.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/session.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 session.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sessobj.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sessobj.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/slot.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 slot.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/token.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 token.c >token.c: In function 'nssCKFWToken_GetUTCTime': >token.c:1265:27: warning: variable 'z' set but not used [-Wunused-but-set-variable] > int Y, M, D, h, m, s, z; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/wrap.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 wrap.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/mechanism.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 mechanism.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssckfw.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssckfw.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crypto.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/find.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/hash.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/instance.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/mutex.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/object.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/session.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sessobj.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/slot.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/token.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/wrap.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/mechanism.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssckfw.a >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssckfw.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >cd builtins; /usr/bin/make libs >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ckfw/builtins' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/anchor.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 anchor.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/constants.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 constants.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bfind.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 bfind.c >bfind.c: In function 'nss_builtins_FindObjectsInit': >bfind.c:126:19: warning: 'data' may be used uninitialized in this function [-Wmaybe-uninitialized] > nsslibc_memequal(a->pValue, data, len, (PRStatus *)NULL)) { > ^ >bfind.c:122:17: note: 'data' was declared here > unsigned char *data; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/binst.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 binst.c >binst.c: In function 'builtins_mdInstance_GetLibraryVersion': >binst.c:74:17: warning: variable 'c' set but not used [-Wunused-but-set-variable] > volatile char c; /* force a reference that won't get optimized away */ > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bobject.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 bobject.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bsession.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 bsession.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bslot.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 bslot.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/btoken.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 btoken.c >perl certdata.perl < certdata.txt > Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certdata.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certdata.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certdata.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ckbiver.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ckbiver.c >grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssckbi.def >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssckbi.so >gcc -shared -m64 -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnssckbi.so -Wl,--version-script,Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nssckbi.def -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssckbi.so Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/anchor.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/constants.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bfind.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/binst.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bobject.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bsession.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bslot.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/btoken.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certdata.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ckbiver.o ../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a ../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >chmod +x Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssckbi.so >../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssckbi.so ../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ckfw/builtins' >cd pem; /usr/bin/make libs >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ckfw/pem' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/anchor.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 anchor.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/constants.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 constants.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pargs.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pargs.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pfind.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pfind.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pinst.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pinst.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pobject.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pobject.c >pobject.c: In function 'pem_CreateObject': >pobject.c:1046:15: warning: variable 'token' set but not used [-Wunused-but-set-variable] > pemToken *token; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/prsa.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 prsa.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/psession.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 psession.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pslot.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pslot.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ptoken.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ptoken.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ckpemver.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ckpemver.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/rsawrapr.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 rsawrapr.c >rsawrapr.c: In function 'constantTimeEQ8': >rsawrapr.c:86:27: warning: suggest parentheses around arithmetic in operand of '|' [-Wparentheses] > unsigned char c = ~(a - b | b - a); > ^ >rsawrapr.c: At top level: >rsawrapr.c:95:22: warning: 'constantTimeCompare' defined but not used [-Wunused-function] > static unsigned char constantTimeCompare(const unsigned char *a, > ^ >rsawrapr.c:109:21: warning: 'constantTimeCondition' defined but not used [-Wunused-function] > static unsigned int constantTimeCondition(unsigned int c, > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/util.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 util.c >util.c: In function 'ReadDERFromFile': >util.c:142:9: warning: variable 'error' set but not used [-Wunused-but-set-variable] > int error; > ^ >grep -v ';-' nsspem.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsspem.def >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnsspem.so >gcc -shared -m64 -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnsspem.so -Wl,--version-script,Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsspem.def -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnsspem.so Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/anchor.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/constants.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pargs.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pfind.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pinst.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pobject.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/prsa.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/psession.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pslot.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ptoken.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ckpemver.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/rsawrapr.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/util.o ../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a ../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /usr/lib64/libfreebl.a -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -L../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -lfreebl3 -L../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssckfw -lnssb -lplc4 -lplds4 -L../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -lfreebl3 -lsoftokn3 -lpthread -ldl -lc -lfreebl3 >chmod +x Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnsspem.so >../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnsspem.so ../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ckfw/pem' >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/ckfw' >cd sysinit; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/sysinit' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsssysinit.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 nsssysinit.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnsssysinit.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnsssysinit.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsssysinit.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnsssysinit.a >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnsssysinit.so >gcc -shared -m64 -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnsssysinit.so -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnsssysinit.so Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsssysinit.o -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >chmod +x Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnsssysinit.so >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnsssysinit.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnsssysinit.so ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib/sysinit' >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/lib' >cd cmd; /usr/bin/make libs >make[1]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd' >cd lib; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/lib' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/basicutil.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 basicutil.c >basicutil.c: In function 'SECU_PrintAsHex': >basicutil.c:279:13: warning: 'column' may be used uninitialized in this function [-Wmaybe-uninitialized] > column += 3; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secutil.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 secutil.c >secutil.c: In function 'SECU_ChangePW2': >secutil.c:319:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] > SECStatus rv; > ^ >secutil.c: In function 'SECU_displayVerifyLog': >secutil.c:3167:11: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > flags = (unsigned int)node->arg; > ^ >secutil.c:3183:11: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > flags = (unsigned int)node->arg; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secpwd.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 secpwd.c >secpwd.c: In function 'SEC_GetPassword': >secpwd.c:77:14: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] > QUIET_FGETS ( phrase, sizeof(phrase), input); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/derprint.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 derprint.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/moreoids.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 moreoids.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pppolicy.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pppolicy.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ffs.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ffs.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11table.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11table.c >rm -f Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsectool.a >ar cr Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsectool.a Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/basicutil.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secutil.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secpwd.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/derprint.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/moreoids.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pppolicy.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ffs.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11table.o >ranlib Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsectool.a >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsectool.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/lib' >cd addbuiltin; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/addbuiltin' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/addbuiltin.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 addbuiltin.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/addbuiltin -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/addbuiltin.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/addbuiltin ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/addbuiltin' >cd atob; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/atob' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/atob.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 atob.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/atob -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/atob.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/atob ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/atob' >cd btoa; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/btoa' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/btoa.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 btoa.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/btoa -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/btoa.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/btoa ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/btoa' >cd certcgi; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/certcgi' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certcgi.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 certcgi.c >certcgi.c: In function 'MakeV1Cert': >certcgi.c:530:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] > SECStatus rv; > ^ >certcgi.c: In function 'string_to_binary': >certcgi.c:1425:24: warning: variable 'low_digit' set but not used [-Wunused-but-set-variable] > int low_digit; > ^ >certcgi.c:1424:24: warning: variable 'high_digit' set but not used [-Wunused-but-set-variable] > int high_digit; > ^ >certcgi.c: At top level: >certcgi.c:360:1: warning: 'update_data_by_name' defined but not used [-Wunused-function] > update_data_by_name(Pair *data, > ^ >certcgi.c:388:1: warning: 'update_data_by_index' defined but not used [-Wunused-function] > update_data_by_index(Pair *data, > ^ >certcgi.c:404:1: warning: 'add_field' defined but not used [-Wunused-function] > add_field(Pair *data, > ^ >certcgi.c: In function 'get_serial_number': >certcgi.c:590:11: warning: ignoring return value of 'fread', declared with attribute warn_unused_result [-Wunused-result] > fread(&serial, sizeof(int), 1, serialFile); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certcgi -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certcgi.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certcgi ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/certcgi' >cd certutil; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/certutil' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certext.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 certext.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certutil.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 certutil.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/keystuff.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 keystuff.c >keystuff.c: In function 'CERTUTIL_GeneratePrivateKey': >keystuff.c:496:24: warning: variable 'algtag' set but not used [-Wunused-but-set-variable] > SECOidTag algtag; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certutil -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certext.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certutil.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/keystuff.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certutil ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/certutil' >cd checkcert; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/checkcert' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/checkcert.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 checkcert.c >checkcert.c: In function 'OurVerifyData': >checkcert.c:125:15: warning: variable 'sigAlgTag' set but not used [-Wunused-but-set-variable] > SECOidTag sigAlgTag; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/checkcert -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/checkcert.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/checkcert ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/checkcert' >cd chktest; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/chktest' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/chktest.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 chktest.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/chktest -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/chktest.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/chktest ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/chktest' >cd crlutil; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/crlutil' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crlgen_lex.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 crlgen_lex.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crlgen.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 crlgen.c >crlgen.c: In function 'crlgen_RmCert': >crlgen.c:1082:18: warning: variable 'arena' set but not used [-Wunused-but-set-variable] > PRArenaPool *arena; > ^ >crlgen.c: In function 'crlgen_CreateInvalidityDate': >crlgen.c:627:22: warning: 'mark' may be used uninitialized in this function [-Wmaybe-uninitialized] > PORT_ArenaRelease(arena, mark); > ^ >crlgen.c: In function 'crlgen_CreateReasonCode': >crlgen.c:586:23: warning: 'mark' may be used uninitialized in this function [-Wmaybe-uninitialized] > PORT_ArenaRelease (arena, mark); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crlutil.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 crlutil.c >crlutil.c: In function 'main': >crlutil.c:1108:16: warning: 'rv' may be used uninitialized in this function [-Wmaybe-uninitialized] > return (rv != SECSuccess); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crlutil -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crlgen_lex.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crlgen.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crlutil.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crlutil ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/crlutil' >cd crmftest; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/crmftest' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/testcrmf.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 testcrmf.c >testcrmf.c: In function 'get_serial_number': >testcrmf.c:130:16: warning: variable 'rv' set but not used [-Wunused-but-set-variable] > SECStatus rv; > ^ >testcrmf.c: In function 'main': >testcrmf.c:1539:23: warning: variable 'PArg' set but not used [-Wunused-but-set-variable] > PRBool PArg = PR_FALSE; > ^ >testcrmf.c:1538:23: warning: variable 'sArg' set but not used [-Wunused-but-set-variable] > PRBool sArg = PR_FALSE; > ^ >testcrmf.c:1537:23: warning: variable 'eArg' set but not used [-Wunused-but-set-variable] > PRBool eArg = PR_FALSE; > ^ >testcrmf.c:1536:23: warning: variable 'pArg' set but not used [-Wunused-but-set-variable] > PRBool pArg = PR_FALSE; > ^ >testcrmf.c: At top level: >testcrmf.c:941:1: warning: 'mapWrapKeyType' defined but not used [-Wunused-function] > mapWrapKeyType(KeyType keyType) > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crmftest -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/testcrmf.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/crmftest ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/crmftest' >cd dbtest; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/dbtest' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dbtest.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 dbtest.c >In file included from ../modutil/modutil.h:21:0, > from dbtest.c:32: >../modutil/error.h:136:14: warning: 'msgStrings' defined but not used [-Wunused-variable] > static char *msgStrings[] = { > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dbtest -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dbtest.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dbtest ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/dbtest' >cd derdump; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/derdump' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/derdump.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 derdump.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/derdump -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/derdump.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/derdump ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/derdump' >cd digest; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/digest' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/digest.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 digest.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/digest -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/digest.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/digest ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/digest' >cd httpserv; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/httpserv' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/httpserv.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 httpserv.c >httpserv.c: In function 'getBoundListenSocket': >httpserv.c:664:24: warning: variable 'socketDomain' set but not used [-Wunused-but-set-variable] > PRUint16 socketDomain = PR_AF_INET; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/httpserv -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/httpserv.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/httpserv ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/httpserv' >cd listsuites; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/listsuites' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/listsuites.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 listsuites.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/listsuites -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/listsuites.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/listsuites ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/listsuites' >cd makepqg; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/makepqg' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/makepqg.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 makepqg.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/makepqg -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/makepqg.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/makepqg ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/makepqg' >cd multinit; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/multinit' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/multinit.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 multinit.c >multinit.c:320:1: warning: 'appendItem' defined but not used [-Wunused-function] > appendItem(SECItem *item) > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/multinit -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/multinit.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/multinit ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/multinit' >cd ocspclnt; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/ocspclnt' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ocspclnt.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ocspclnt.c >ocspclnt.c: In function 'main': >ocspclnt.c:448:8: warning: 'cert_usage' may be used uninitialized in this function [-Wmaybe-uninitialized] > rv = CERT_VerifyCert (handle, cert, PR_TRUE, cert_usage, verify_time, > ^ >ocspclnt.c:969:18: note: 'cert_usage' was declared here > SECCertUsage cert_usage; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ocspclnt -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ocspclnt.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ocspclnt ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/ocspclnt' >cd ocspresp; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/ocspresp' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ocspresp.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ocspresp.c >ocspresp.c: In function 'main': >ocspresp.c:140:15: warning: variable 'statusDecodedFail' set but not used [-Wunused-but-set-variable] > SECStatus statusDecodedFail; > ^ >ocspresp.c:136:15: warning: variable 'statusDecodedRev' set but not used [-Wunused-but-set-variable] > SECStatus statusDecodedRev; > ^ >ocspresp.c:132:15: warning: variable 'statusDecoded' set but not used [-Wunused-but-set-variable] > SECStatus statusDecoded; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ocspresp -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ocspresp.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ocspresp ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/ocspresp' >cd oidcalc; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/oidcalc' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/oidcalc.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 oidcalc.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/oidcalc -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/oidcalc.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/oidcalc ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/oidcalc' >cd p7content; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/p7content' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7content.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 p7content.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7content -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7content.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7content ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/p7content' >cd p7env; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/p7env' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7env.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 p7env.c >p7env.c: In function 'main': >p7env.c:135:11: warning: variable 'certName' set but not used [-Wunused-but-set-variable] > char *certName; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7env -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7env.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7env ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/p7env' >cd p7sign; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/p7sign' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7sign.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 p7sign.c >p7sign.c: In function 'main': >p7sign.c:263:32: warning: 'cert' may be used uninitialized in this function [-Wmaybe-uninitialized] > CERT_DestroyCertificate(cert); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7sign -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7sign.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7sign ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/p7sign' >cd p7verify; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/p7verify' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7verify.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 p7verify.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7verify -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7verify.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/p7verify ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/p7verify' >cd pk12util; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pk12util' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk12util.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk12util.c >pk12util.c: In function 'p12u_InitContext': >pk12util.c:104:12: warning: variable 'fileExist' set but not used [-Wunused-but-set-variable] > PRBool fileExist; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk12util -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk12util.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk12util ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pk12util' >cd pk11mode; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pk11mode' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11mode.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11mode.c >pk11mode.c: In function 'PKM_TLSMasterKeyDerive': >pk11mode.c:4561:29: warning: variable 'expected_version' set but not used [-Wunused-but-set-variable] > CK_VERSION expected_version, version; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11mode -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11mode.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11mode ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pk11mode' >cd pk1sign; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pk1sign' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk1sign.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk1sign.c >pk1sign.c: In function 'main': >pk1sign.c:282:32: warning: 'cert' may be used uninitialized in this function [-Wmaybe-uninitialized] > CERT_DestroyCertificate(cert); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk1sign -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk1sign.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk1sign ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pk1sign' >cd pkix-errcodes; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pkix-errcodes' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix-errcodes.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pkix-errcodes.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix-errcodes -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix-errcodes.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pkix-errcodes ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pkix-errcodes' >cd pp; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pp' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pp.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pp.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pp -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pp.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pp ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pp' >cd pwdecrypt; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pwdecrypt' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pwdecrypt.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pwdecrypt.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pwdecrypt -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pwdecrypt.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pwdecrypt ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/pwdecrypt' >cd rsaperf; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/rsaperf' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/rsaperf.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 rsaperf.c >rsaperf.c: In function 'main': >rsaperf.c:433:27: warning: variable 'certdb' set but not used [-Wunused-but-set-variable] > CERTCertDBHandle* certdb = NULL; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/defkey.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 defkey.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/rsaperf -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/rsaperf.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/defkey.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/rsaperf ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/rsaperf' >cd sdrtest; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/sdrtest' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sdrtest.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sdrtest.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sdrtest -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sdrtest.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sdrtest ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/sdrtest' >cd selfserv; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/selfserv' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/selfserv.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 selfserv.c >selfserv.c: In function 'logger': >selfserv.c:729:9: warning: pointer targets in passing argument 1 of 'PR_AtomicSet' differ in signedness [-Wpointer-sign] > totalPeriodBytes += PR_ATOMIC_SET(&loggerBytes, 0); > ^ >In file included from /usr/include/nspr4/nspr.h:9:0, > from selfserv.c:30: >/usr/include/nspr4/pratom.h:51:19: note: expected 'PRInt32 *' but argument is of type 'PRUint32 *' > NSPR_API(PRInt32) PR_AtomicSet(PRInt32 *val, PRInt32 newval); > ^ >selfserv.c:730:9: warning: pointer targets in passing argument 1 of 'PR_AtomicSet' differ in signedness [-Wpointer-sign] > totalPeriodBytesTCP += PR_ATOMIC_SET(&loggerBytesTCP, 0); > ^ >In file included from /usr/include/nspr4/nspr.h:9:0, > from selfserv.c:30: >/usr/include/nspr4/pratom.h:51:19: note: expected 'PRInt32 *' but argument is of type 'PRUint32 *' > NSPR_API(PRInt32) PR_AtomicSet(PRInt32 *val, PRInt32 newval); > ^ >selfserv.c: In function 'handle_connection': >selfserv.c:1344:17: warning: pointer targets in passing argument 1 of 'PR_AtomicAdd' differ in signedness [-Wpointer-sign] > PR_ATOMIC_ADD(&loggerBytes, rv); > ^ >In file included from /usr/include/nspr4/nspr.h:9:0, > from selfserv.c:30: >/usr/include/nspr4/pratom.h:63:19: note: expected 'PRInt32 *' but argument is of type 'PRUint32 *' > NSPR_API(PRInt32) PR_AtomicAdd(PRInt32 *ptr, PRInt32 val); > ^ >selfserv.c:1345:17: warning: pointer targets in passing argument 1 of 'PR_AtomicIncrement' differ in signedness [-Wpointer-sign] > PR_ATOMIC_INCREMENT(&bulkSentChunks); > ^ >In file included from /usr/include/nspr4/nspr.h:9:0, > from selfserv.c:30: >/usr/include/nspr4/pratom.h:28:19: note: expected 'PRInt32 *' but argument is of type 'PRUint32 *' > NSPR_API(PRInt32) PR_AtomicIncrement(PRInt32 *val); > ^ >selfserv.c:1354:13: warning: pointer targets in passing argument 1 of 'PR_AtomicDecrement' differ in signedness [-Wpointer-sign] > PR_ATOMIC_DECREMENT(&loggerOps); > ^ >In file included from /usr/include/nspr4/nspr.h:9:0, > from selfserv.c:30: >/usr/include/nspr4/pratom.h:39:19: note: expected 'PRInt32 *' but argument is of type 'PRUint32 *' > NSPR_API(PRInt32) PR_AtomicDecrement(PRInt32 *val); > ^ >selfserv.c: In function 'do_accepts': >selfserv.c:1439:13: warning: pointer targets in passing argument 1 of 'PR_AtomicIncrement' differ in signedness [-Wpointer-sign] > PR_ATOMIC_INCREMENT(&loggerOps); > ^ >In file included from /usr/include/nspr4/nspr.h:9:0, > from selfserv.c:30: >/usr/include/nspr4/pratom.h:28:19: note: expected 'PRInt32 *' but argument is of type 'PRUint32 *' > NSPR_API(PRInt32) PR_AtomicIncrement(PRInt32 *val); > ^ >selfserv.c: In function 'getBoundListenSocket': >selfserv.c:1486:24: warning: variable 'socketDomain' set but not used [-Wunused-but-set-variable] > PRUint16 socketDomain = PR_AF_INET; > ^ >selfserv.c: In function 'logWritev': >selfserv.c:1557:9: warning: pointer targets in passing argument 1 of 'PR_AtomicAdd' differ in signedness [-Wpointer-sign] > PR_ATOMIC_ADD(&loggerBytesTCP, rv); > ^ >In file included from /usr/include/nspr4/nspr.h:9:0, > from selfserv.c:30: >/usr/include/nspr4/pratom.h:63:19: note: expected 'PRInt32 *' but argument is of type 'PRUint32 *' > NSPR_API(PRInt32) PR_AtomicAdd(PRInt32 *ptr, PRInt32 val); > ^ >selfserv.c: In function 'logWrite': >selfserv.c:1570:9: warning: pointer targets in passing argument 1 of 'PR_AtomicAdd' differ in signedness [-Wpointer-sign] > PR_ATOMIC_ADD(&loggerBytesTCP, rv); > ^ >In file included from /usr/include/nspr4/nspr.h:9:0, > from selfserv.c:30: >/usr/include/nspr4/pratom.h:63:19: note: expected 'PRInt32 *' but argument is of type 'PRUint32 *' > NSPR_API(PRInt32) PR_AtomicAdd(PRInt32 *ptr, PRInt32 val); > ^ >selfserv.c: In function 'logSend': >selfserv.c:1587:9: warning: pointer targets in passing argument 1 of 'PR_AtomicAdd' differ in signedness [-Wpointer-sign] > PR_ATOMIC_ADD(&loggerBytesTCP, rv); > ^ >In file included from /usr/include/nspr4/nspr.h:9:0, > from selfserv.c:30: >/usr/include/nspr4/pratom.h:63:19: note: expected 'PRInt32 *' but argument is of type 'PRUint32 *' > NSPR_API(PRInt32) PR_AtomicAdd(PRInt32 *ptr, PRInt32 val); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/selfserv -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/selfserv.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/selfserv ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/selfserv' >cd signtool; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/signtool' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/signtool.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 signtool.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certgen.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 certgen.c >certgen.c: In function 'sign_cert': >certgen.c:423:11: warning: variable 'dummy' set but not used [-Wunused-but-set-variable] > void *dummy; > ^ >certgen.c: In function 'GetSubjectFromUser': >certgen.c:125:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] > fgets(buf, STDIN_BUF_SIZE, stdin); > ^ >certgen.c:147:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] > fgets(buf, STDIN_BUF_SIZE, stdin); > ^ >certgen.c:166:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] > fgets(buf, STDIN_BUF_SIZE, stdin); > ^ >certgen.c:184:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] > fgets(buf, STDIN_BUF_SIZE, stdin); > ^ >certgen.c:202:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] > fgets(buf, STDIN_BUF_SIZE, stdin); > ^ >certgen.c:223:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] > fgets(buf, STDIN_BUF_SIZE, stdin); > ^ >certgen.c:241:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] > fgets(buf, STDIN_BUF_SIZE, stdin); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/javascript.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 javascript.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/list.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 list.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sign.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 sign.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/util.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 util.c >util.c: In function 'XP_GetString': >util.c:21:5: warning: return discards 'const' qualifier from pointer target type [enabled by default] > return SECU_Strerror (i); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/verify.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 verify.c >verify.c: In function 'VerifyJar': >verify.c:55:11: warning: assignment discards 'const' qualifier from pointer target type [enabled by default] > errtext = SECU_Strerror(PORT_GetError()); > ^ >verify.c: In function 'JarWho': >verify.c:286:11: warning: assignment discards 'const' qualifier from pointer target type [enabled by default] > errtext = SECU_Strerror(PORT_GetError()); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/zip.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 zip.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/signtool -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/signtool.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/certgen.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/javascript.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/list.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/sign.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/util.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/verify.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/zip.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libjar.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/signtool ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/signtool' >cd signver; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/signver' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/signver.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 signver.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk7print.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk7print.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/signver -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/signver.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk7print.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/signver ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/signver' >cd shlibsign; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/shlibsign.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 shlibsign.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/shlibsign -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/shlibsign.o -m64 -Wl,-z,relro -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/shlibsign ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >cd mangle; /usr/bin/make libs >make[3]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/mangle' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/mangle.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 mangle.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/mangle -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/mangle.o -m64 -Wl,-z,relro -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/mangle ../../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[3]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/mangle' >cd Linux2.6_ppc_glibc_PTH_64_OPT.OBJ ; sh "/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ" \ >"/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ" Linux \ >"/usr/lib64" "/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.so" >/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.so >Library File: ../../../security/nss/lib/softoken/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsoftokn3.so 1432656 bytes >Check File: ../../../security/nss/lib/softoken/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libsoftokn3.chk >Link: libsoftokn3.chk > hash: 32 bytes > 89 5a 55 2a eb 1d e3 55 23 de > 14 6b 57 db ed 00 91 e2 eb f7 > 59 98 9a 82 5d b2 a7 49 d7 8d > b3 d0 > signature: 64 bytes > 62 f5 eb aa 64 87 25 d5 cc ab > da 99 d7 a8 36 35 a9 ac 9d 3b > 68 f7 4a 5d 99 4e 51 ec 9e 7d > 03 56 8c 13 d2 dc 38 be 45 51 > 3e 14 91 04 79 63 4b d8 9e aa > 76 c6 37 10 b3 0d 14 54 21 bb > e5 70 d1 bd >moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB >Generate a DSA key pair ... >cd Linux2.6_ppc_glibc_PTH_64_OPT.OBJ ; sh "/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ" \ >"/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ" Linux \ >"/usr/lib64" "/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.so" >/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.so >Library File: ../../../security/nss/lib/freebl/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so 1424988 bytes >Check File: ../../../security/nss/lib/freebl/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.chk >Link: libfreebl3.chk > hash: 32 bytes > 70 cf 13 68 c7 2d cc 5e a1 fd > 54 1a 1c a0 9c 60 be e4 b2 93 > ee bf 40 3a 6d 45 35 8b 46 7c > 3f ed > signature: 64 bytes > 6c d6 70 53 f6 00 af 97 f1 c9 > 2e 61 5f e4 8d 06 c4 a3 69 c4 > f1 3c 6e f0 4d ef 07 7b b5 e9 > e5 4a 74 ba 64 9a e8 3a 01 5b > 87 af f1 2f c1 aa 09 96 16 3d > d0 52 8c a7 b1 84 aa 80 1c b8 > 06 c4 d1 56 >moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB >Generate a DSA key pair ... >cd Linux2.6_ppc_glibc_PTH_64_OPT.OBJ ; sh "/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ" \ >"/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ" Linux \ >"/usr/lib64" "/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssdbm3.so" >/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssdbm3.so >Library File: ../../../security/nss/lib/softoken/legacydb/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssdbm3.so 1053503 bytes >Check File: ../../../security/nss/lib/softoken/legacydb/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/libnssdbm3.chk >Link: libnssdbm3.chk > hash: 32 bytes > 85 e0 41 59 86 24 2e 39 5a ec > 61 1f c2 79 83 d6 86 c1 12 12 > 58 64 44 28 47 b6 1f b1 4d 0f > 80 dc > signature: 64 bytes > 0c 6b 88 59 9e 04 24 aa 4e c9 > 63 e9 7c 71 66 75 8c 60 7f 9e > b7 d1 df 93 ca 41 16 d0 02 1e > 56 c1 2d 9b 60 26 ee c7 0f 10 > db 17 2c 4e 62 ce af 7d 55 6c > a0 cf 6a 59 f7 09 36 27 ba c8 > 5d e9 ac 34 >moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB >Generate a DSA key pair ... >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/shlibsign' >cd smimetools; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/smimetools' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsutil.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 cmsutil.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsutil -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsutil.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/cmsutil ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/smimetools' >cd ssltap; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/ssltap' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssltap.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 ssltap.c >ssltap.c: In function 'print_ssl': >ssltap.c:1140:9: warning: variable 'l' set but not used [-Wunused-but-set-variable] > int i,l; > ^ >ssltap.c:1140:7: warning: variable 'i' set but not used [-Wunused-but-set-variable] > int i,l; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssltap -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssltap.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/ssltap ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/ssltap' >cd strsclnt; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/strsclnt' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/strsclnt.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 strsclnt.c >In file included from /usr/include/nspr4/nspr.h:9:0, > from strsclnt.c:20: >strsclnt.c: In function 'myHandshakeCallback': >strsclnt.c:706:45: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] > PR_ATOMIC_SET(&lastFullHandshakePeerID, (PRInt32) arg); > ^ >/usr/include/nspr4/pratom.h:130:54: note: in definition of macro 'PR_ATOMIC_SET' > #define PR_ATOMIC_SET(val, newval) PR_AtomicSet(val, newval) > ^ >strsclnt.c: In function 'do_connects': >strsclnt.c:831:62: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast] > SSL_HandshakeCallback(ssl_sock, myHandshakeCallback, (void*)thisPeerID); > ^ >strsclnt.c:726:18: warning: variable 'result' set but not used [-Wunused-but-set-variable] > SECStatus result; > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/strsclnt -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/strsclnt.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/strsclnt ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/strsclnt' >cd symkeyutil; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/symkeyutil' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/symkeyutil.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 symkeyutil.c >symkeyutil.c: In function 'main': >symkeyutil.c:1018:31: warning: unused variable 'rv2' [-Wunused-variable] > SECStatus rv2 = PK11_FreeSlotListElement(slotList, se); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/symkeyutil -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/symkeyutil.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/symkeyutil ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/symkeyutil' >cd tests; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/tests' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/baddbdir.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 baddbdir.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/baddbdir -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/baddbdir.o \ >-m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/conflict.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 conflict.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/conflict -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/conflict.o \ >-m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dertimetest.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 dertimetest.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dertimetest -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dertimetest.o \ >-m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/encodeinttest.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 encodeinttest.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/encodeinttest -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/encodeinttest.o \ >-m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nonspr10.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 nonspr10.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nonspr10 -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nonspr10.o \ >-m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/remtest.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 remtest.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/remtest -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/remtest.o \ >-m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secmodtest.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 secmodtest.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secmodtest -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secmodtest.o \ >-m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/baddbdir Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/conflict Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/dertimetest Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/encodeinttest Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nonspr10 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/remtest Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/secmodtest ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/tests' >cd tstclnt; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/tstclnt' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/tstclnt.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 tstclnt.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/tstclnt -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/tstclnt.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/tstclnt ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/tstclnt' >cd vfychain; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/vfychain' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/vfychain.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 vfychain.c >vfychain.c: In function 'configureRevocationParams': >vfychain.c:363:50: warning: 'revFlags' may be used uninitialized in this function [-Wmaybe-uninitialized] > revFlags[cert_revocation_method_ocsp] = > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/vfychain -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/vfychain.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/vfychain ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/vfychain' >cd vfyserv; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/vfyserv' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/vfyserv.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 vfyserv.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/vfyutil.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 vfyutil.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/vfyserv -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/vfyserv.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/vfyutil.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/vfyserv ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/vfyserv' >cd modutil; /usr/bin/make libs >make[2]: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/modutil' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/modutil.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 modutil.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 pk11.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/instsec.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 instsec.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/install.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 install.c >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/installparse.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 installparse.c >ytab.c: In function 'Pk11Install_yyparse': >ytab.c:219:5: warning: suggest parentheses around assignment used as truth value [-Wparentheses] >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/install-ds.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 install-ds.c >install-ds.c: In function 'Pk11Install_File_Generate': >install-ds.c:223:40: warning: comparison with string literal results in unspecified behavior [-Waddress] > if(*endp != '\0' || subval->string == "\0") { > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lex.Pk11Install_yy.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 lex.Pk11Install_yy.c >installparse.l:25:17: warning: 'Pkcs11Install_yyunput' defined but not used [-Wunused-function] > > ^ >lex.Pk11Install_yy.cpp:1060:13: note: in expansion of macro 'yyunput' >lex.Pk11Install_yy.cpp:1106:12: warning: 'input' defined but not used [-Wunused-function] >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/modutil -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/modutil.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/pk11.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/instsec.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/install.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/installparse.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/install-ds.o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lex.Pk11Install_yy.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libjar.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/modutil ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make[2]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/modutil' >make[1]: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd' >make: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss' >+ tar xf build_these_later.tar >+ unset NSS_ENABLE_ECC >+ /usr/bin/make -C ./mozilla/security/nss/cmd/bltest >make: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/bltest' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/blapitest.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 blapitest.c >blapitest.c: In function 'serialize_key': >blapitest.c:322:15: warning: variable 'status' set but not used [-Wunused-but-set-variable] > SECStatus status; > ^ >blapitest.c: In function 'dsaOp': >blapitest.c:65:22: warning: variable 'L100' set but not used [-Wunused-but-set-variable] > PRInt64 tmp, L100; \ > ^ >blapitest.c:2222:17: note: in expansion of macro 'TIMEMARK' > TIMEMARK(cipherInfo->seconds); > ^ >blapitest.c:65:22: warning: variable 'L100' set but not used [-Wunused-but-set-variable] > PRInt64 tmp, L100; \ > ^ >blapitest.c:2254:17: note: in expansion of macro 'TIMEMARK' > TIMEMARK(cipherInfo->seconds); > ^ >blapitest.c:65:22: warning: variable 'L100' set but not used [-Wunused-but-set-variable] > PRInt64 tmp, L100; \ > ^ >blapitest.c:2290:13: note: in expansion of macro 'TIMEMARK' > TIMEMARK(cipherInfo->seconds); > ^ >blapitest.c: In function 'cipherDoOp': >blapitest.c:65:22: warning: variable 'L100' set but not used [-Wunused-but-set-variable] > PRInt64 tmp, L100; \ > ^ >blapitest.c:2488:13: note: in expansion of macro 'TIMEMARK' > TIMEMARK(cipherInfo->seconds); > ^ >blapitest.c:65:22: warning: variable 'L100' set but not used [-Wunused-but-set-variable] > PRInt64 tmp, L100; \ > ^ >blapitest.c:2522:13: note: in expansion of macro 'TIMEMARK' > TIMEMARK(cipherInfo->seconds); > ^ >blapitest.c:65:22: warning: variable 'L100' set but not used [-Wunused-but-set-variable] > PRInt64 tmp, L100; \ > ^ >blapitest.c:2556:13: note: in expansion of macro 'TIMEMARK' > TIMEMARK(cipherInfo->seconds); > ^ >blapitest.c: In function 'printPR_smpString': >blapitest.c:2692:13: warning: variable 'prnRes' set but not used [-Wunused-but-set-variable] > int prnRes; > ^ >blapitest.c: In function 'main': >blapitest.c:3574:11: warning: variable 'infileName' set but not used [-Wunused-but-set-variable] > char *infileName, *outfileName, *keyfileName, *ivfileName; > ^ >blapitest.c:3693:5: warning: 'ret' may be used uninitialized in this function [-Wmaybe-uninitialized] > if (ret != 0) { > ^ >blapitest.c:4113:30: warning: 'totalTime' may be used uninitialized in this function [-Wmaybe-uninitialized] > dump_performance_info(cipherInfoListHead, totalTime, > ^ >blapitest.c:3830:18: warning: 'cipherInfo' may be used uninitialized in this function [-Wmaybe-uninitialized] > PORT_Free(cipherInfo); > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bltest -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/blapitest.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bltest ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/bltest' >+ unset NSS_ENABLE_ECC >+ /usr/bin/make -C ./mozilla/security/nss/cmd/fipstest >make: Entering directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/fipstest' >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/fipstest.o -c -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 fipstest.c >fipstest.c: In function 'drbg': >fipstest.c:2602:12: warning: variable 'predictionResistance' set but not used [-Wunused-but-set-variable] > PRBool predictionResistance = PR_FALSE; > ^ >fipstest.c: In function 'hmac_test': >fipstest.c:3680:35: warning: argument to 'sizeof' in 'memset' call is the same expression as the destination; did you mean to provide an explicit length? [-Wsizeof-pointer-memaccess] > memset(msg, 0, sizeof msg); > ^ >fipstest.c: At top level: >fipstest.c:2540:1: warning: 'alloc_value' defined but not used [-Wunused-function] > alloc_value(char *buf, int *len) > ^ >fipstest.c: In function 'tdea_kat_mmt': >fipstest.c:456:16: warning: 'mode' may be used uninitialized in this function [-Wmaybe-uninitialized] > rv = tdea_decrypt_buf(mode, key, > ^ >fipstest.c: In function 'aes_kat_mmt': >fipstest.c:1116:9: warning: 'keysize' may be used uninitialized in this function [-Wmaybe-uninitialized] > rv = aes_decrypt_buf(mode, key, keysize, > ^ >fipstest.c:1116:9: warning: 'mode' may be used uninitialized in this function [-Wmaybe-uninitialized] >fipstest.c: In function 'aes_ecb_mct': >fipstest.c:1380:6: warning: 'keysize' may be used uninitialized in this function [-Wmaybe-uninitialized] > cx = AES_CreateContext(key, NULL, NSS_AES, > ^ >fipstest.c: In function 'aes_cbc_mct': >fipstest.c:1763:19: warning: 'keysize' may be used uninitialized in this function [-Wmaybe-uninitialized] > aes_mct_next_key(key, keysize, plaintext_1, plaintext); > ^ >fipstest.c: In function 'rng_vst': >fipstest.c:3066:19: warning: 'b' may be used uninitialized in this function [-Wmaybe-uninitialized] > for (j=0; j<b/8; i+=2,j++) { > ^ >fipstest.c: In function 'rng_mct': >fipstest.c:3190:19: warning: 'b' may be used uninitialized in this function [-Wmaybe-uninitialized] > for (j=0; j<b/8; i+=2,j++) { > ^ >fipstest.c: In function 'sha_test': >fipstest.c:3495:26: warning: 'msgLen' may be used uninitialized in this function [-Wmaybe-uninitialized] > if (sha_calcMD(MD, MDlen, > ^ >fipstest.c:3495:26: warning: 'MDlen' may be used uninitialized in this function [-Wmaybe-uninitialized] >fipstest.c: In function 'hmac_test': >fipstest.c:3563:13: warning: 'hash_alg' may be used uninitialized in this function [-Wmaybe-uninitialized] > hashObj = (SECHashObject *) HASH_GetRawHashObject(hashAlg); > ^ >fipstest.c:3608:19: note: 'hash_alg' was declared here > HASH_HashType hash_alg; /* HMAC type */ > ^ >fipstest.c:3636:23: warning: 'TLen' may be used uninitialized in this function [-Wmaybe-uninitialized] > if (memcmp(HMAC, expectedHMAC, TLen) != 0) { > ^ >fipstest.c:3577:17: warning: 'HMACLen' may be used uninitialized in this function [-Wmaybe-uninitialized] > hmac_status = HMAC_Finish(cx, hmac_computed, &bytes_hashed, > ^ >fipstest.c:3602:18: note: 'HMACLen' was declared here > unsigned int HMACLen; /* the length of the HMAC Bytes */ > ^ >fipstest.c:3700:13: warning: 'keyLen' may be used uninitialized in this function [-Wmaybe-uninitialized] > for (j=0; j< keyLen; i+=2,j++) { > ^ >fipstest.c: In function 'dsa_pqgver_test': >fipstest.c:4030:30: warning: 'pghSize' may be used uninitialized in this function [-Wmaybe-uninitialized] > SECITEM_AllocItem(NULL, &pqg.base, pghSize); > ^ >fipstest.c: In function 'dsa_pqggen_test': >fipstest.c:4310:24: warning: 'keySizeIndex' may be used uninitialized in this function [-Wmaybe-uninitialized] > rv = PQG_ParamGenSeedLen(keySizeIndex, PQG_TEST_SEED_BYTES, > ^ >gcc -o Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/fipstest -O2 -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -m64 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/fipstest.o -m64 -Wl,-z,relro ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc >../../../coreconf/nsinstall/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/fipstest ../../../../dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >make: Leaving directory `/builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/cmd/fipstest' >+ /usr/bin/rm -f build_these_later.tar >+ /usr/bin/mkdir -p ./mozilla/dist/pkgconfig >+ /usr/bin/cat /builddir/build/SOURCES/nss.pc.in >+ sed -e s,%libdir%,/usr/lib64,g -e s,%prefix%,/usr,g -e s,%exec_prefix%,/usr,g -e s,%includedir%,/usr/include/nss3,g -e s,%NSS_VERSION%,3.14.3,g -e s,%NSPR_VERSION%,4.9.5,g -e s,%NSSUTIL_VERSION%,3.14.3,g -e s,%SOFTOKEN_VERSION%,3.14.3,g >++ cat mozilla/security/nss/lib/nss/nss.h >++ grep '#define.*NSS_VMAJOR' >++ awk '{print $3}' >+ NSS_VMAJOR=3 >++ cat mozilla/security/nss/lib/nss/nss.h >++ grep '#define.*NSS_VMINOR' >++ awk '{print $3}' >+ NSS_VMINOR=14 >++ cat mozilla/security/nss/lib/nss/nss.h >++ grep '#define.*NSS_VPATCH' >++ awk '{print $3}' >+ NSS_VPATCH=3 >+ export NSS_VMAJOR >+ export NSS_VMINOR >+ export NSS_VPATCH >+ /usr/bin/cat /builddir/build/SOURCES/nss-config.in >+ sed -e s,@libdir@,/usr/lib64,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss3,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,14,g -e s,@MOD_PATCH_VERSION@,3,g >+ chmod 755 ./mozilla/dist/pkgconfig/nss-config >+ /usr/bin/cat /builddir/build/SOURCES/setup-nsssysinit.sh >+ chmod 755 ./mozilla/dist/pkgconfig/setup-nsssysinit.sh >+ /usr/bin/cp ./mozilla/security/nss/lib/ckfw/nssck.api ./mozilla/dist/private/nss/ >+ exit 0 >Executing(%install): /bin/sh -e /var/tmp/rpm-tmp.OulxTn >+ umask 022 >+ cd /builddir/build/BUILD >+ '[' /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64 '!=' / ']' >+ rm -rf /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64 >++ dirname /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64 >+ mkdir -p /builddir/build/BUILDROOT >+ mkdir /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64 >+ cd nss-3.14.3 >+ /usr/bin/rm -rf /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64 >+ /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/templates >+ /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/bin >+ /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64 >+ /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64/nss/unsupported-tools >+ /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64/pkgconfig >+ touch /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/lib64/libnssckbi.so >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64/nss/libnssckbi.so >+ for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64 >+ for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64 >+ for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64 >+ for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64 >+ for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64 >+ /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//etc/pki/nssdb >+ /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert8.db /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//etc/pki/nssdb/cert8.db >+ /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key3.db /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//etc/pki/nssdb/key3.db >+ /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-secmod.db /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//etc/pki/nssdb/secmod.db >+ /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert9.db /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//etc/pki/nssdb/cert9.db >+ /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key4.db /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//etc/pki/nssdb/key4.db >+ /usr/bin/install -p -m 644 /builddir/build/SOURCES/system-pkcs11.txt /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//etc/pki/nssdb/pkcs11.txt >+ for file in libcrmf.a libnssb.a libnssckfw.a >+ /usr/bin/install -p -m 644 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64 >+ for file in libcrmf.a libnssb.a libnssckfw.a >+ /usr/bin/install -p -m 644 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64 >+ for file in libcrmf.a libnssb.a libnssckfw.a >+ /usr/bin/install -p -m 644 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64 >+ for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin/certutil /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/bin >+ for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin/cmsutil /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/bin >+ for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin/crlutil /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/bin >+ for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin/modutil /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/bin >+ for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin/pk12util /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/bin >+ for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin/signtool /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/bin >+ for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin/signver /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/bin >+ for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin/ssltap /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/bin >+ for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin/atob /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64/nss/unsupported-tools >+ for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin/btoa /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64/nss/unsupported-tools >+ for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin/derdump /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64/nss/unsupported-tools >+ for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin/ocspclnt /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64/nss/unsupported-tools >+ for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin/pp /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64/nss/unsupported-tools >+ for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin/selfserv /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64/nss/unsupported-tools >+ for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin/strsclnt /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64/nss/unsupported-tools >+ for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin/symkeyutil /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64/nss/unsupported-tools >+ for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin/tstclnt /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64/nss/unsupported-tools >+ for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin/vfyserv /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64/nss/unsupported-tools >+ for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain >+ /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin/vfychain /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64/nss/unsupported-tools >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/base64.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/blapit.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/cert.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/certdb.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/certt.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/ciferfam.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/cmmf.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/cmmft.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/cms.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/cmsreclist.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/cmst.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/crmf.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/crmft.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/cryptohi.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/cryptoht.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/ecl-exp.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/hasht.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/jar-ds.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/jar.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/jarfile.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/key.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/keyhi.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/keyt.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/keythi.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nss.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssb64.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssb64t.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssbase.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssbaset.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckbi.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckepv.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckft.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckfw.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckfwc.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckfwt.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckg.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckmdt.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckt.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssilckt.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssilock.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nsslocks.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nsspem.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssrwlk.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssrwlkt.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssutil.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/ocsp.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/ocspt.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/p12.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/p12plcy.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/p12t.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11func.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11pqg.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11priv.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11pub.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11sdr.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11f.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11n.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11p.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11t.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11u.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs12.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs12t.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs7t.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/portreg.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/preenc.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/secasn1.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/secasn1t.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/seccomon.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/secder.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/secdert.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/secdig.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/secdigt.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/secerr.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/sechash.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/secitem.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/secmime.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/secmod.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/secmodt.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/secoid.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/secoidt.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/secpkcs5.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/secpkcs7.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/secport.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/shsign.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/smime.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/ssl.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/sslerr.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/sslproto.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/sslt.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/utilmodt.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/utilpars.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/utilparst.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in 'mozilla/dist/public/nss/*.h' >+ /usr/bin/install -p -m 644 mozilla/dist/public/nss/utilrename.h /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3 >+ for file in mozilla/dist/private/nss/nssck.api >+ /usr/bin/install -p -m 644 mozilla/dist/private/nss/nssck.api /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/templates >+ /usr/bin/install -p -m 644 ./mozilla/dist/pkgconfig/nss.pc /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/lib64/pkgconfig/nss.pc >+ /usr/bin/install -p -m 755 ./mozilla/dist/pkgconfig/nss-config /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/bin/nss-config >+ /usr/bin/install -p -m 755 ./mozilla/dist/pkgconfig/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/bin/setup-nsssysinit.sh >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/base64.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/ciferfam.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/nssb64.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/nssb64t.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/nsslocks.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/nssilock.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/nssilckt.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/nssrwlk.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/nssrwlkt.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/nssutil.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/pkcs11.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/pkcs11f.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/pkcs11n.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/pkcs11p.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/pkcs11t.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/pkcs11u.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/portreg.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/secasn1.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/secasn1t.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/seccomon.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/secder.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/secdert.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/secdig.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/secdigt.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/secerr.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/secitem.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/secoid.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/secoidt.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/secport.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/utilrename.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/utilmodt.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/utilpars.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/utilparst.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/alghmac.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/blapit.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/ecl-exp.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/hasht.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/shsign.h >+ rm -f /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64//usr/include/nss3/nsslowhash.h >+ /usr/lib/rpm/find-debuginfo.sh --strict-build-id -m --run-dwz --dwz-low-mem-die-limit 10000000 --dwz-max-die-limit 50000000 /builddir/build/BUILD/nss-3.14.3 >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/lib64/libnsssysinit.so >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/lib64/libssl3.so >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/lib64/libsmime3.so >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/lib64/nss/unsupported-tools/pp >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/lib64/nss/unsupported-tools/derdump >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/lib64/nss/unsupported-tools/symkeyutil >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/lib64/nss/unsupported-tools/vfychain >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/lib64/nss/unsupported-tools/atob >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/lib64/nss/unsupported-tools/tstclnt >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/lib64/nss/unsupported-tools/selfserv >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/lib64/nss/unsupported-tools/ocspclnt >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/lib64/nss/unsupported-tools/btoa >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/lib64/nss/unsupported-tools/vfyserv >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/lib64/nss/unsupported-tools/strsclnt >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/lib64/nss/libnssckbi.so >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/lib64/libnsspem.so >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/lib64/libnss3.so >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/bin/certutil >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/bin/signtool >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/bin/cmsutil >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/bin/ssltap >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/bin/modutil >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/bin/signver >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/bin/crlutil >extracting debug info from /builddir/build/BUILDROOT/nss-3.14.3-9.fc19.ppc64/usr/bin/pk12util >cpio: nss-3.14.3/mozilla/security/nss/cmd/modutil/lex.Pk11Install_yy.cpp: Cannot stat: No such file or directory >cpio: nss-3.14.3/mozilla/security/nss/cmd/modutil/ytab.c: Cannot stat: No such file or directory >23568 blocks >+ /usr/lib/rpm/check-buildroot >+ /usr/lib/rpm/redhat/brp-compress >+ /usr/lib/rpm/redhat/brp-strip-static-archive /usr/bin/strip >+ /usr/lib/rpm/brp-python-bytecompile /usr/bin/python 1 >+ /usr/lib/rpm/redhat/brp-python-hardlink >+ /usr/lib/rpm/redhat/brp-java-repack-jars >Executing(%check): /bin/sh -e /var/tmp/rpm-tmp.3rFVG7 >+ umask 022 >+ cd /builddir/build/BUILD >+ cd nss-3.14.3 >+ '[' -eq 1 ']' >/var/tmp/rpm-tmp.3rFVG7: line 29: [: -eq: unary operator expected >+ FREEBL_NO_DEPEND=1 >+ export FREEBL_NO_DEPEND >+ BUILD_OPT=1 >+ export BUILD_OPT >+ USE_64=1 >+ export USE_64 >++ find ./mozilla/security/nss/tests >++ grep -c ' ' >+ SPACEISBAD=0 >+ : >+ '[' 0 -ne 0 ']' >++ perl -e 'print 9000 + int rand 1000' >+ MYRAND=9218 >+ echo 9218 >9218 >selfserv_9218 >+ RANDSERV=selfserv_9218 >+ echo selfserv_9218 >++ ls -d ./mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >+ DISTBINDIR=./mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >+ echo ./mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >./mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >++ pwd >+ pushd /builddir/build/BUILD/nss-3.14.3 >~/build/BUILD/nss-3.14.3 ~/build/BUILD/nss-3.14.3 >+ cd ./mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin >+ ln -s selfserv selfserv_9218 >+ popd >~/build/BUILD/nss-3.14.3 >+ find ./mozilla/security/nss/tests -type f >+ grep -v '\.db$' >+ grep -v '\.crl$' >+ grep -v '\.crt$' >+ grep -vw CVS >+ xargs grep -lw selfserv >+ xargs -l perl -pi -e 's/\bselfserv\b/selfserv_9218/g' >+ killall selfserv_9218 >selfserv_9218: no process found >+ : >+ rm -rf ./mozilla/tests_results >+ cd ./mozilla/security/nss/tests/ >+ nss_tests='cipher libpkix cert dbtests tools fips sdr crmf smime ssl merge pkits chains' >+ HOST=localhost >+ DOMSUF=localdomain >+ PORT=9218 >+ NSS_CYCLES= >+ NSS_TESTS= >+ NSS_SSL_TESTS= >+ NSS_SSL_RUN= >+ ./all.sh >testdir is /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security >init.sh init: Creating /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security >which: no domainname in (.:/builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/usr/local/sbin:/builddir/.local/bin:/builddir/bin) >******************************************** > Platform: Linux2.6_ppc_glibc_PTH_64_OPT.OBJ > Results: localhost.1 >******************************************** >init.sh init: Testing PATH .:/builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/usr/local/sbin:/builddir/.local/bin:/builddir/bin against LIB /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib: >Running tests for cipher >TIMESTAMP cipher BEGIN: Wed Mar 6 17:11:13 MST 2013 >cipher.sh: Cipher Tests =============================== >cipher.sh: DES ECB Encrypt -------------------------------- >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Encryption self-test for des_ecb passed. >bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Encryption self-test for des_ecb passed. >cipher.sh: #1: DES ECB Encrypt - PASSED >cipher.sh: DES ECB Decrypt -------------------------------- >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Decryption self-test for des_ecb passed. >bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Decryption self-test for des_ecb passed. >cipher.sh: #2: DES ECB Decrypt - PASSED >cipher.sh: DES CBC Encrypt -------------------------------- >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Encryption self-test for des_cbc passed. >bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Encryption self-test for des_cbc passed. >cipher.sh: #3: DES CBC Encrypt - PASSED >cipher.sh: DES CBC Decrypt -------------------------------- >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Decryption self-test for des_cbc passed. >bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Decryption self-test for des_cbc passed. >cipher.sh: #4: DES CBC Decrypt - PASSED >cipher.sh: DES3 ECB Encrypt -------------------------------- >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Encryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Encryption self-test for des3_ecb passed. >cipher.sh: #5: DES3 ECB Encrypt - PASSED >cipher.sh: DES3 ECB Decrypt -------------------------------- >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Decryption self-test for des3_ecb passed. >bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Decryption self-test for des3_ecb passed. >cipher.sh: #6: DES3 ECB Decrypt - PASSED >cipher.sh: DES3 CBC Encrypt -------------------------------- >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Encryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Encryption self-test for des3_cbc passed. >cipher.sh: #7: DES3 CBC Encrypt - PASSED >cipher.sh: DES3 CBC Decrypt -------------------------------- >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Decryption self-test for des3_cbc passed. >bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Decryption self-test for des3_cbc passed. >cipher.sh: #8: DES3 CBC Decrypt - PASSED >cipher.sh: AES ECB Encrypt -------------------------------- >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Encryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Encryption self-test for aes_ecb passed. >cipher.sh: #9: AES ECB Encrypt - PASSED >cipher.sh: AES ECB Decrypt -------------------------------- >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Decryption self-test for aes_ecb passed. >bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Decryption self-test for aes_ecb passed. >cipher.sh: #10: AES ECB Decrypt - PASSED >cipher.sh: AES CBC Encrypt -------------------------------- >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Encryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Encryption self-test for aes_cbc passed. >cipher.sh: #11: AES CBC Encrypt - PASSED >cipher.sh: AES CBC Decrypt -------------------------------- >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Decryption self-test for aes_cbc passed. >bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Decryption self-test for aes_cbc passed. >cipher.sh: #12: AES CBC Decrypt - PASSED >cipher.sh: Camellia ECB Encrypt -------------------------------- >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >Encryption self-test for camellia_ecb passed. >cipher.sh: #13: Camellia ECB Encrypt - PASSED >cipher.sh: Camellia ECB Decrypt -------------------------------- >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >Decryption self-test for camellia_ecb passed. >cipher.sh: #14: Camellia ECB Decrypt - PASSED >cipher.sh: Camellia CBC Encrypt -------------------------------- >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >Encryption self-test for camellia_cbc passed. >cipher.sh: #15: Camellia CBC Encrypt - PASSED >cipher.sh: Camellia CBC Decrypt -------------------------------- >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >Decryption self-test for camellia_cbc passed. >cipher.sh: #16: Camellia CBC Decrypt - PASSED >cipher.sh: SEED ECB Encrypt -------------------------------- >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Encryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Encryption self-test for seed_ecb passed. >cipher.sh: #17: SEED ECB Encrypt - PASSED >cipher.sh: SEED ECB Decrypt -------------------------------- >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Decryption self-test for seed_ecb passed. >bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Decryption self-test for seed_ecb passed. >cipher.sh: #18: SEED ECB Decrypt - PASSED >cipher.sh: SEED CBC Encrypt -------------------------------- >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Encryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Encryption self-test for seed_cbc passed. >cipher.sh: #19: SEED CBC Encrypt - PASSED >cipher.sh: SEED CBC Decrypt -------------------------------- >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Decryption self-test for seed_cbc passed. >bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Decryption self-test for seed_cbc passed. >cipher.sh: #20: SEED CBC Decrypt - PASSED >cipher.sh: RC2 ECB Encrypt -------------------------------- >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Encryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Encryption self-test for rc2_ecb passed. >cipher.sh: #21: RC2 ECB Encrypt - PASSED >cipher.sh: RC2 ECB Decrypt -------------------------------- >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Decryption self-test for rc2_ecb passed. >bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Decryption self-test for rc2_ecb passed. >cipher.sh: #22: RC2 ECB Decrypt - PASSED >cipher.sh: RC2 CBC Encrypt -------------------------------- >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Encryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Encryption self-test for rc2_cbc passed. >cipher.sh: #23: RC2 CBC Encrypt - PASSED >cipher.sh: RC2 CBC Decrypt -------------------------------- >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Decryption self-test for rc2_cbc passed. >bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Decryption self-test for rc2_cbc passed. >cipher.sh: #24: RC2 CBC Decrypt - PASSED >cipher.sh: RC4 Encrypt -------------------------------- >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Encryption self-test for rc4 passed. >Encryption self-test for rc4 passed. >cipher.sh: #25: RC4 Encrypt - PASSED >cipher.sh: RC4 Decrypt -------------------------------- >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Decryption self-test for rc4 passed. >Decryption self-test for rc4 passed. >cipher.sh: #26: RC4 Decrypt - PASSED >cipher.sh: RSA Encrypt -------------------------------- >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Encryption self-test for rsa passed. >bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Encryption self-test for rsa passed. >cipher.sh: #27: RSA Encrypt - PASSED >cipher.sh: RSA Decrypt -------------------------------- >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Decryption self-test for rsa passed. >bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Decryption self-test for rsa passed. >cipher.sh: #28: RSA Decrypt - PASSED >cipher.sh: DSA Sign -------------------------------- >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >Signature self-test for dsa passed. >cipher.sh: #29: DSA Sign - PASSED >cipher.sh: DSA Verify -------------------------------- >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >Verification self-test for dsa passed. >cipher.sh: #30: DSA Verify - PASSED >cipher.sh: MD2 Hash -------------------------------- >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Hash self-test for md2 passed. >bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Hash self-test for md2 passed. >cipher.sh: #31: MD2 Hash - PASSED >cipher.sh: MD5 Hash -------------------------------- >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Hash self-test for md5 passed. >bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Hash self-test for md5 passed. >cipher.sh: #32: MD5 Hash - PASSED >cipher.sh: SHA1 Hash -------------------------------- >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Hash self-test for sha1 passed. >bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Hash self-test for sha1 passed. >cipher.sh: #33: SHA1 Hash - PASSED >cipher.sh: SHA224 Hash -------------------------------- >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Hash self-test for sha224 passed. >Hash self-test for sha224 passed. >cipher.sh: #34: SHA224 Hash - PASSED >cipher.sh: SHA256 Hash -------------------------------- >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Hash self-test for sha256 passed. >Hash self-test for sha256 passed. >cipher.sh: #35: SHA256 Hash - PASSED >cipher.sh: SHA384 Hash -------------------------------- >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Hash self-test for sha384 passed. >Hash self-test for sha384 passed. >cipher.sh: #36: SHA384 Hash - PASSED >cipher.sh: SHA512 Hash -------------------------------- >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 >Hash self-test for sha512 passed. >Hash self-test for sha512 passed. >cipher.sh: #37: SHA512 Hash - PASSED >TIMESTAMP cipher END: Wed Mar 6 17:11:50 MST 2013 >Running tests for lowhash >TIMESTAMP lowhash BEGIN: Wed Mar 6 17:11:50 MST 2013 >lowhash.sh: Lowhash Tests - /proc/sys/crypto/fips_enabled is 0 =============================== >freebl lowhash not supported in this plaform. >lowhash.sh done >TIMESTAMP lowhash END: Wed Mar 6 17:11:50 MST 2013 >Running tests for libpkix >TIMESTAMP libpkix BEGIN: Wed Mar 6 17:11:50 MST 2013 >TIMESTAMP libpkix END: Wed Mar 6 17:11:50 MST 2013 >Running tests for cert >TIMESTAMP cert BEGIN: Wed Mar 6 17:11:50 MST 2013 >cert.sh: Certutil and Crlutil Tests =============================== >cert.sh: #38: Looking for root certs module. - PASSED >cert.sh: Creating a CA Certificate TestCA ========================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/CA >cert.sh: Creating CA Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/CA -f ../tests.pw >cert.sh: #39: Creating CA Cert DB - PASSED >cert.sh: Loading root cert module to CA Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/CA >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #40: Loading root cert module to CA Cert DB - PASSED >cert.sh: Certificate initialized ---------- >cert.sh: Creating CA Cert TestCA -------------------------- >certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >cert.sh: #41: Creating CA Cert TestCA - PASSED >cert.sh: Exporting Root Cert -------------------------- >certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/CA -o root.cert >cert.sh: #42: Exporting Root Cert - PASSED >cert.sh: Creating a CA Certificate serverCA ========================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/serverCA >cert.sh: Creating CA Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/serverCA -f ../tests.pw >cert.sh: #43: Creating CA Cert DB - PASSED >cert.sh: Loading root cert module to CA Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/serverCA >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #44: Loading root cert module to CA Cert DB - PASSED >cert.sh: Certificate initialized ---------- >cert.sh: Creating CA Cert serverCA -------------------------- >certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >cert.sh: #45: Creating CA Cert serverCA - PASSED >cert.sh: Exporting Root Cert -------------------------- >certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/serverCA -o root.cert >cert.sh: #46: Exporting Root Cert - PASSED >cert.sh: Creating a CA Certificate chain-1-serverCA ========================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/serverCA >cert.sh: Creating CA Cert chain-1-serverCA -------------------------- >certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >cert.sh: #47: Creating CA Cert chain-1-serverCA - PASSED >cert.sh: Exporting Root Cert -------------------------- >certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/serverCA -o root.cert >cert.sh: #48: Exporting Root Cert - PASSED >cert.sh: Creating a CA Certificate chain-2-serverCA ========================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/serverCA >cert.sh: Creating CA Cert chain-2-serverCA -------------------------- >certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >cert.sh: #49: Creating CA Cert chain-2-serverCA - PASSED >cert.sh: Exporting Root Cert -------------------------- >certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/serverCA -o root.cert >cert.sh: #50: Exporting Root Cert - PASSED >cert.sh: Creating a CA Certificate clientCA ========================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/clientCA >cert.sh: Creating CA Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/clientCA -f ../tests.pw >cert.sh: #51: Creating CA Cert DB - PASSED >cert.sh: Loading root cert module to CA Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/clientCA >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #52: Loading root cert module to CA Cert DB - PASSED >cert.sh: Certificate initialized ---------- >cert.sh: Creating CA Cert clientCA -------------------------- >certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >cert.sh: #53: Creating CA Cert clientCA - PASSED >cert.sh: Exporting Root Cert -------------------------- >certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/clientCA -o root.cert >cert.sh: #54: Exporting Root Cert - PASSED >cert.sh: Creating a CA Certificate chain-1-clientCA ========================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/clientCA >cert.sh: Creating CA Cert chain-1-clientCA -------------------------- >certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >cert.sh: #55: Creating CA Cert chain-1-clientCA - PASSED >cert.sh: Exporting Root Cert -------------------------- >certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/clientCA -o root.cert >cert.sh: #56: Exporting Root Cert - PASSED >cert.sh: Creating a CA Certificate chain-2-clientCA ========================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/clientCA >cert.sh: Creating CA Cert chain-2-clientCA -------------------------- >certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >cert.sh: #57: Creating CA Cert chain-2-clientCA - PASSED >cert.sh: Exporting Root Cert -------------------------- >certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/clientCA -o root.cert >cert.sh: #58: Exporting Root Cert - PASSED >cert.sh: Creating Certificates, issued by the last =============== > of a chain of CA's which are not in the same database============ >Server Cert >cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_server -f ../tests.pw >cert.sh: #59: Initializing localhost.localdomain's Cert DB (ext.) - PASSED >cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_server >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #60: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED >cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- >certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_server -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #61: Generate Cert Request for localhost.localdomain (ext) - PASSED >cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- >certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw >cert.sh: #62: Sign localhost.localdomain's Request (ext) - PASSED >cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- >certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain.cert >cert.sh: #63: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED >cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- >certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/clientCA/clientCA.ca.cert >cert.sh: #64: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED >Importing all the server's own CA chain into the servers DB >cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- >certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/serverCA/chain-2-serverCA.ca.cert >cert.sh: #65: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED >cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- >certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/serverCA/chain-1-serverCA.ca.cert >cert.sh: #66: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED >cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- >certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/serverCA/serverCA.ca.cert >cert.sh: #67: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED >Client Cert >cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_client -f ../tests.pw >cert.sh: #68: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED >cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_client >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #69: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED >cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- >certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #70: Generate Cert Request for ExtendedSSLUser (ext) - PASSED >cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- >certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw >cert.sh: #71: Sign ExtendedSSLUser's Request (ext) - PASSED >cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- >certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert >cert.sh: #72: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED >cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- >certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/serverCA/serverCA.ca.cert >cert.sh: #73: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED >Importing all the client's own CA chain into the servers DB >cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- >certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/clientCA/clientCA.ca.cert >cert.sh: #74: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED >cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- >certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/clientCA/chain-1-clientCA.ca.cert >cert.sh: #75: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED >cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- >certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/clientCA/chain-2-clientCA.ca.cert >cert.sh: #76: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED >cert.sh SUCCESS: EXT passed >cert.sh: Creating Client CA Issued Certificates =============== >cert.sh: Initializing TestUser's Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw >cert.sh: #77: Initializing TestUser's Cert DB - PASSED >cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #78: Loading root cert module to TestUser's Cert DB - PASSED >cert.sh: Import Root CA for TestUser -------------------------- >certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -i ../CA/TestCA.ca.cert >cert.sh: #79: Import Root CA for TestUser - PASSED >cert.sh: Generate Cert Request for TestUser -------------------------- >certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #80: Generate Cert Request for TestUser - PASSED >cert.sh: Sign TestUser's Request -------------------------- >certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw >cert.sh: #81: Sign TestUser's Request - PASSED >cert.sh: Import TestUser's Cert -------------------------- >certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser.cert >cert.sh: #82: Import TestUser's Cert - PASSED >cert.sh SUCCESS: TestUser's Cert Created >cert.sh: Creating Server CA Issued Certificate for \ > localhost.localdomain ------------------------------------ >cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server -f ../tests.pw >cert.sh: #83: Initializing localhost.localdomain's Cert DB - PASSED >cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #84: Loading root cert module to localhost.localdomain's Cert DB - PASSED >cert.sh: Import Root CA for localhost.localdomain -------------------------- >certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server -i ../CA/TestCA.ca.cert >cert.sh: #85: Import Root CA for localhost.localdomain - PASSED >cert.sh: Generate Cert Request for localhost.localdomain -------------------------- >certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #86: Generate Cert Request for localhost.localdomain - PASSED >cert.sh: Sign localhost.localdomain's Request -------------------------- >certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw >cert.sh: #87: Sign localhost.localdomain's Request - PASSED >cert.sh: Import localhost.localdomain's Cert -------------------------- >certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain.cert >cert.sh: #88: Import localhost.localdomain's Cert - PASSED >cert.sh SUCCESS: localhost.localdomain's Cert Created >cert.sh: Creating Server CA Issued Certificate for \ > localhost.localdomain-sni -------------------------------- >cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- >certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #89: Generate Cert Request for localhost-sni.localdomain - PASSED >cert.sh: Sign localhost-sni.localdomain's Request -------------------------- >certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw >cert.sh: #90: Sign localhost-sni.localdomain's Request - PASSED >cert.sh: Import localhost-sni.localdomain's Cert -------------------------- >certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain.cert >cert.sh: #91: Import localhost-sni.localdomain's Cert - PASSED >cert.sh SUCCESS: localhost-sni.localdomain's Cert Created >cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- >certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server -f ../tests.pw >cert.sh: #92: Modify trust attributes of Root CA -t TC,TC,TC - PASSED >cert.sh SUCCESS: SSL passed >cert.sh: Creating Client CA Issued Certificates ============== >cert.sh: Initializing Alice's Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/alicedir -f ../tests.pw >cert.sh: #93: Initializing Alice's Cert DB - PASSED >cert.sh: Loading root cert module to Alice's Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/alicedir >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #94: Loading root cert module to Alice's Cert DB - PASSED >cert.sh: Import Root CA for Alice -------------------------- >certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/alicedir -i ../CA/TestCA.ca.cert >cert.sh: #95: Import Root CA for Alice - PASSED >cert.sh: Generate Cert Request for Alice -------------------------- >certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #96: Generate Cert Request for Alice - PASSED >cert.sh: Sign Alice's Request -------------------------- >certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw >cert.sh: #97: Sign Alice's Request - PASSED >cert.sh: Import Alice's Cert -------------------------- >certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice.cert >cert.sh: #98: Import Alice's Cert - PASSED >cert.sh SUCCESS: Alice's Cert Created >cert.sh: Initializing Bob's Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/bobdir -f ../tests.pw >cert.sh: #99: Initializing Bob's Cert DB - PASSED >cert.sh: Loading root cert module to Bob's Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/bobdir >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #100: Loading root cert module to Bob's Cert DB - PASSED >cert.sh: Import Root CA for Bob -------------------------- >certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/bobdir -i ../CA/TestCA.ca.cert >cert.sh: #101: Import Root CA for Bob - PASSED >cert.sh: Generate Cert Request for Bob -------------------------- >certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #102: Generate Cert Request for Bob - PASSED >cert.sh: Sign Bob's Request -------------------------- >certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw >cert.sh: #103: Sign Bob's Request - PASSED >cert.sh: Import Bob's Cert -------------------------- >certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob.cert >cert.sh: #104: Import Bob's Cert - PASSED >cert.sh SUCCESS: Bob's Cert Created >cert.sh: Creating Dave's Certificate ------------------------- >cert.sh: Initializing Dave's Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/dave -f ../tests.pw >cert.sh: #105: Initializing Dave's Cert DB - PASSED >cert.sh: Loading root cert module to Dave's Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/dave >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #106: Loading root cert module to Dave's Cert DB - PASSED >cert.sh: Import Root CA for Dave -------------------------- >certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/dave -i ../CA/TestCA.ca.cert >cert.sh: #107: Import Root CA for Dave - PASSED >cert.sh: Generate Cert Request for Dave -------------------------- >certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #108: Generate Cert Request for Dave - PASSED >cert.sh: Sign Dave's Request -------------------------- >certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw >cert.sh: #109: Sign Dave's Request - PASSED >cert.sh: Import Dave's Cert -------------------------- >certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave.cert >cert.sh: #110: Import Dave's Cert - PASSED >cert.sh SUCCESS: Dave's Cert Created >cert.sh: Creating multiEmail's Certificate -------------------- >cert.sh: Initializing Eve's Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/eve -f ../tests.pw >cert.sh: #111: Initializing Eve's Cert DB - PASSED >cert.sh: Loading root cert module to Eve's Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/eve >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #112: Loading root cert module to Eve's Cert DB - PASSED >cert.sh: Import Root CA for Eve -------------------------- >certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/eve -i ../CA/TestCA.ca.cert >cert.sh: #113: Import Root CA for Eve - PASSED >cert.sh: Generate Cert Request for Eve -------------------------- >certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #114: Generate Cert Request for Eve - PASSED >cert.sh: Sign Eve's Request -------------------------- >certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com >cert.sh: #115: Sign Eve's Request - PASSED >cert.sh: Import Eve's Cert -------------------------- >certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve.cert >cert.sh: #116: Import Eve's Cert - PASSED >cert.sh SUCCESS: Eve's Cert Created >cert.sh: Importing Certificates ============================== >cert.sh: Import Bob's cert into Alice's db -------------------------- >certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert >cert.sh: #117: Import Bob's cert into Alice's db - PASSED >cert.sh: Import Dave's cert into Alice's DB -------------------------- >certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert >cert.sh: #118: Import Dave's cert into Alice's DB - PASSED >cert.sh: Import Dave's cert into Bob's DB -------------------------- >certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert >cert.sh: #119: Import Dave's cert into Bob's DB - PASSED >cert.sh: Import Eve's cert into Alice's DB -------------------------- >certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert >cert.sh: #120: Import Eve's cert into Alice's DB - PASSED >cert.sh: Import Eve's cert into Bob's DB -------------------------- >certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert >cert.sh: #121: Import Eve's cert into Bob's DB - PASSED >cert.sh SUCCESS: SMIME passed >cert.sh: Creating FIPS 140 DSA Certificates ============== >cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips -f ../tests.fipspw >cert.sh: #122: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED >cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #123: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED >cert.sh: Enable FIPS mode on database ----------------------- >modutil -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips -fips true >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >FIPS mode enabled. >cert.sh: #124: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED >cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- >certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise >Generating key. This may take a few moments... >cert.sh: #125: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED >cert.sh SUCCESS: FIPS passed >cert.sh: Initializing TestExt's Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -f ../tests.pw >cert.sh: #126: Initializing TestExt's Cert DB - PASSED >cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #127: Loading root cert module to TestExt's Cert DB - PASSED >cert.sh: Import Root CA for TestExt -------------------------- >certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA.ca.cert >cert.sh: #128: Import Root CA for TestExt - PASSED >cert.sh: Generate Cert Request for TestExt -------------------------- >certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #129: Generate Cert Request for TestExt - PASSED >cert.sh: Sign TestExt's Request -------------------------- >certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw >cert.sh: #130: Sign TestExt's Request - PASSED >cert.sh: Import TestExt's Cert -------------------------- >certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt.cert >cert.sh: #131: Import TestExt's Cert - PASSED >cert.sh SUCCESS: TestExt's Cert Created >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args >certutil options: >0 >1 >2 >3 >4 >5 >6 >10 >n >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt1 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:51:be > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View > ,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:11:56 2013 > Not After : Fri Jun 07 00:11:56 2013 > Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie > w,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bc:e8:97:80:1a:b9:40:4f:b2:38:79:e6:e0:fc:63:50: > 5f:85:25:ea:c0:73:a7:cf:14:d9:1f:eb:16:54:76:ce: > c9:5f:33:5a:ed:0d:c8:53:51:b9:ff:8f:a4:db:c0:ca: > ed:52:c8:96:22:3c:62:d6:29:a7:cf:d9:87:a2:f0:73: > 2b:8f:5d:02:66:ce:7d:72:1c:c4:1f:ce:89:35:09:15: > 6b:23:7a:7b:a9:6f:eb:60:08:9d:12:87:a8:2c:83:ae: > aa:2b:10:b5:62:2a:99:a1:88:8e:8a:8c:95:7e:2a:06: > 83:4d:3d:ca:c3:6d:3f:86:31:d6:e6:1b:12:35:d8:65 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Key Usage > Usages: Digital Signature > Non-Repudiation > Key Encipherment > Data Encipherment > Key Agreement > Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 40:15:59:a3:77:51:ae:b8:2d:75:3c:3e:52:a4:37:9d: > 09:a0:4c:9f:32:fa:5f:66:13:3f:ff:a5:cc:c6:51:a9: > 30:0e:3d:24:cb:a5:49:ed:26:57:a4:77:83:da:cb:e3: > 26:d6:8d:81:3a:4c:b6:fb:a0:cc:90:cb:95:7e:fb:74: > 63:59:8b:a8:fc:10:30:11:ff:b4:df:b1:2f:be:70:74: > ed:6e:65:63:08:1d:5f:20:a3:8a:c9:39:df:e0:30:c9: > 3e:e7:10:5e:b4:0c:13:11:1e:8b:d6:0c:79:4c:2b:44: > 36:36:71:c6:7b:5a:3e:52:43:17:19:43:2f:0d:3b:77 > Fingerprint (MD5): > 12:8D:CC:1F:DC:5C:E6:59:87:2E:BD:0A:20:59:40:0A > Fingerprint (SHA1): > 01:CE:D6:1A:A8:11:8C:87:3C:85:8B:78:8B:33:D2:0E:38:07:98:6E > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #132: Certificate Key Usage Extension (1) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args >certutil options: >0 >1 >2 >3 >4 >5 >6 >10 >y >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt2 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:51:bf > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View > ,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:11:56 2013 > Not After : Fri Jun 07 00:11:56 2013 > Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie > w,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ac:27:ff:c7:ca:43:57:87:f2:70:d3:49:3a:a1:78:50: > f6:ff:a1:7f:67:cb:e1:3c:3c:d7:f9:07:ed:db:40:e4: > 48:06:56:f1:8a:fc:6f:51:bd:11:a6:87:34:66:ae:66: > 18:30:85:02:c0:3c:76:4b:b0:c4:a5:ee:50:c7:0e:b3: > 8a:38:94:d1:1f:e2:ac:af:32:e2:1b:77:d6:2f:d8:20: > ae:29:c4:7a:08:d5:1a:82:5d:f3:20:6f:32:c3:88:1c: > 6b:1a:c4:c0:ea:6a:5d:aa:fb:c4:8f:99:4f:31:b5:bd: > fe:e2:d3:a2:2a:e6:31:4d:e5:f4:0a:8a:d5:65:e5:f3 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Key Usage > Critical: True > Usages: Digital Signature > Non-Repudiation > Key Encipherment > Data Encipherment > Key Agreement > Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 79:8b:5d:bc:48:cc:3b:b7:ea:6a:59:3a:64:9c:72:4f: > 68:bb:57:66:0e:d1:56:f8:c0:d9:b5:ba:cc:70:ce:79: > 8a:56:39:e4:20:ea:f0:d1:9a:f1:1e:8f:08:20:b3:bd: > cc:4b:67:19:c3:8b:72:fd:64:f4:88:ba:a2:e8:6a:99: > 26:81:65:52:db:e4:f2:92:c1:da:ad:47:73:d6:6e:1c: > 93:a5:64:18:ae:fd:c3:8d:cf:6b:4c:f8:b4:0f:b2:56: > fb:a8:e7:58:40:2f:c1:30:76:22:bb:8a:61:9d:91:93: > 5d:82:53:ad:ea:32:5a:8f:c1:eb:19:57:58:5a:6c:3c > Fingerprint (MD5): > 94:DB:91:08:53:C3:48:93:6D:31:9C:13:2C:DC:7E:09 > Fingerprint (SHA1): > 93:42:F0:80:65:E5:18:50:9B:19:97:66:F8:BA:2A:A0:B3:62:11:B3 > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #133: Certificate Key Usage Extension (2) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args >certutil options: >y >-1 >n >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt3 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:51:c0 > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View > ,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:11:56 2013 > Not After : Fri Jun 07 00:11:56 2013 > Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie > w,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c0:98:6f:ef:c3:c6:a4:1c:71:c4:60:f7:4d:07:53:7e: > 4d:a3:2f:18:f7:04:62:8c:60:77:a7:18:9c:f5:30:8e: > 2d:04:ef:49:55:97:e3:17:39:ff:95:11:2d:9e:5f:95: > 41:19:98:44:7d:02:36:c7:cf:ab:30:17:26:28:f2:b3: > 1f:90:be:03:7a:08:41:84:7f:86:a9:76:bd:3f:16:d3: > 20:f2:62:12:42:cc:ad:ae:50:94:f5:ec:fb:24:64:be: > af:95:a2:c9:53:e6:85:7b:86:3e:cc:76:ca:cb:c7:d5: > 92:71:ff:2d:e2:94:80:23:f8:ad:44:c2:a6:39:21:6f > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 68:a4:53:5f:4a:80:7e:9c:64:f8:58:8a:3b:07:60:bc: > 12:ca:b5:54:34:7e:92:f1:03:14:ac:31:50:b7:ce:3a: > bc:eb:7d:f5:01:27:12:96:09:86:2e:0a:98:08:8e:aa: > b1:7a:6d:a8:4d:04:39:be:51:6f:00:03:b4:32:18:7f: > 0a:4e:0f:b4:34:ca:1e:4b:d6:66:7d:dd:0b:7c:ac:66: > da:a1:e1:15:52:2b:eb:d9:d8:56:45:0c:bd:75:43:a1: > 45:10:6d:f5:92:5e:f0:86:5e:79:15:4a:ad:81:05:e8: > 8d:6f:f7:92:1b:a2:49:eb:c5:63:5f:c0:f2:6f:06:b6 > Fingerprint (MD5): > A0:D8:81:45:17:AF:E3:3A:83:D5:C9:43:01:F6:3A:12 > Fingerprint (SHA1): > 3C:1D:CB:AE:C5:3B:22:15:9A:7E:D9:70:4E:68:DF:48:8A:E4:90:BB > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #134: Certificate Basic Constraints Extension (3) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args >certutil options: >n >-1 >y >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt4 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:51:c0 > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View > ,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:11:56 2013 > Not After : Fri Jun 07 00:11:56 2013 > Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie > w,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c7:4a:dc:be:b8:f4:13:2b:ca:a5:80:bd:c7:94:de:58: > 43:18:15:fb:1f:c9:5b:d2:f4:70:5a:ae:91:50:5b:a3: > 33:06:b8:fb:be:61:68:f6:53:a7:74:25:b3:ab:5c:d1: > b9:de:69:27:15:4b:24:d1:c8:6b:7d:2b:8f:b2:c9:55: > a8:d2:91:f0:be:e3:b3:48:f2:a1:ae:c3:3b:99:48:b4: > 23:b6:b5:18:c5:80:cf:73:0e:52:38:1a:6a:85:bf:2f: > aa:51:a3:3f:55:19:7c:27:26:c8:0d:f2:82:f4:73:4c: > df:ca:71:c7:b2:da:2f:27:04:c3:c2:62:33:98:cd:17 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is not a CA. > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 38:a7:45:32:0b:ef:cd:e9:b4:3f:0d:b1:ea:2f:a5:cb: > 65:fd:3b:86:a2:3f:08:db:06:e3:6e:46:fd:19:b7:3d: > 7f:e3:b5:b1:40:d4:ab:e1:ac:7c:c5:19:15:a3:52:29: > 21:e6:a7:e8:0a:56:fd:00:e2:c1:2a:3c:e2:49:2f:09: > 36:78:23:5e:5d:1e:1b:a2:28:30:9b:ae:4b:e5:89:47: > 9b:fc:e9:2c:98:02:10:e6:ce:05:2e:7d:a3:69:ac:e3: > 6e:d2:64:ed:fa:00:40:ce:39:fc:7e:c0:f1:22:e6:31: > 5f:0c:55:2e:b9:70:4d:e0:fc:61:a1:8f:b7:02:fc:b4 > Fingerprint (MD5): > 40:23:BE:0C:7A:B2:20:D9:32:B0:51:DC:B6:67:AC:40 > Fingerprint (SHA1): > D6:43:AD:85:D0:AC:51:55:84:A7:18:09:5E:F3:05:21:59:84:22:E4 > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #135: Certificate Basic Constraints Extension (4) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args >certutil options: >y >12341235123 >y >Generating key. This may take a few moments... >Enter value for the authKeyID extension [y/N]? >Enter value for the key identifier fields,enter to omit: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Enter value for the authCertSerial field, enter to omit: >Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt5 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:51:c0 > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View > ,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:11:57 2013 > Not After : Fri Jun 07 00:11:57 2013 > Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie > w,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ba:2d:3e:5d:b4:21:c0:ac:1d:20:8b:dd:4b:73:bb:6a: > 45:23:e2:f8:19:54:fd:e2:1d:0c:ce:76:e0:77:e5:0c: > bf:36:04:0e:11:4b:95:eb:97:44:b3:32:9a:c4:5b:73: > c6:f7:07:fd:a2:44:c6:04:81:d4:06:8c:07:8a:7d:dd: > 85:64:a1:21:2d:da:56:f2:dd:30:94:b8:a8:07:88:60: > 01:d6:82:5c:bb:e0:a7:16:82:6c:04:46:8f:f6:3b:3c: > fb:5d:a3:91:17:e4:47:ed:85:59:df:19:47:4f:34:8f: > 53:ce:66:e9:37:84:2f:23:34:f2:1b:2b:ef:ab:1a:81 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Authority Key Identifier > Critical: True > Key ID: > 12341235123 > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 3f:04:c4:7a:b2:2a:61:13:3d:3a:23:cd:15:f3:9d:a9: > 3b:74:28:4e:73:64:6a:af:aa:72:0a:ce:44:a9:7b:c2: > 3a:79:3c:da:4e:79:04:99:e2:5f:37:38:f2:14:38:34: > 1f:95:c8:d2:a4:e3:1c:27:c5:4c:9c:b0:47:97:18:db: > ee:4f:e6:d7:2d:cb:c7:51:df:52:dc:05:1b:44:dc:1f: > 32:6a:ff:d3:4d:48:2e:a3:7b:a3:66:1a:56:80:92:d0: > f2:0b:f1:45:81:b6:f9:fe:81:f9:d4:82:3b:98:5a:1a: > 8a:7a:a8:89:e4:59:34:d5:5d:48:cd:32:ba:be:f8:52 > Fingerprint (MD5): > 7D:44:C8:A6:A3:F7:64:DC:30:E0:5D:50:1D:6E:41:F3 > Fingerprint (SHA1): > 1C:04:B3:8B:E4:EE:55:6D:FA:DC:92:9E:E2:E9:63:B4:8D:4E:D0:7D > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #136: Certificate Authority Key Identifier Extension (5) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args >certutil options: >y >3 >test.com >214123 >y >Generating key. This may take a few moments... >Enter value for the authKeyID extension [y/N]? >Enter value for the key identifier fields,enter to omit: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Enter value for the authCertSerial field, enter to omit: >Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt6 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:51:c1 > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View > ,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:11:57 2013 > Not After : Fri Jun 07 00:11:57 2013 > Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie > w,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b7:97:0b:db:01:98:2c:13:d7:26:5f:88:74:f6:97:59: > 7b:35:96:8f:11:46:3c:3e:c6:be:1a:f0:44:b3:9e:07: > a1:fd:a9:99:f0:e3:7f:8c:d7:64:63:54:34:bb:ae:1f: > c4:06:ef:5d:2c:fe:ba:56:20:a0:34:7e:d6:0b:9d:2a: > 43:68:b7:b0:c7:9e:a9:01:97:20:16:26:81:c1:98:b5: > 96:76:57:1b:30:6d:75:a5:06:2f:24:39:b7:89:01:cd: > 0f:9f:90:06:77:b8:a5:df:da:5b:e4:06:ec:9d:89:9e: > 7b:64:e3:ea:c7:4b:28:c8:19:ee:e1:e9:e6:eb:cd:41 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Authority Key Identifier > Critical: True > Issuer: > DNS name: "test.com" > Serial Number: > 214123 > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > ad:6e:9c:f9:07:29:48:37:a7:6d:e2:1c:99:90:20:2b: > 25:3e:ed:f1:02:dc:76:e3:3f:7f:2c:24:f8:71:dd:0f: > ec:7d:7b:7b:af:8c:89:63:6e:b0:57:74:0c:87:8e:85: > f9:c4:28:41:f6:db:7f:7a:28:a0:ed:3a:d9:43:56:63: > 0f:0f:21:73:bb:1c:5d:cb:44:df:0c:6c:04:f0:59:9b: > d4:b5:3c:95:74:4a:d6:6c:c6:6c:7c:a2:78:c7:3f:24: > 6d:7b:bb:71:ba:ce:0b:4a:09:fa:7d:a9:89:d5:63:17: > 46:c0:82:9a:3f:16:a1:c2:9a:85:d6:3b:c3:28:f0:e6 > Fingerprint (MD5): > B1:C3:54:FD:73:DA:F9:EC:F0:BC:B2:5B:9C:71:C6:D8 > Fingerprint (SHA1): > 2A:D9:12:32:8D:EE:AD:35:C0:38:BB:CA:99:C4:05:DF:81:B9:40:B3 > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #137: Certificate Authority Key Identifier Extension (6) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args >certutil options: >1 >2 >rfc822@name.tld >3 >test.com >8 >1.2.3.4 >9 >OID.0.2.213 >10 >0 >10 >n >n >Generating key. This may take a few moments... >Enter the type of the distribution point name: > 1 - Full Name > 2 - Relative Name > Any other number to finish > Choice: > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Select one of the following for the reason flags > 0 - unused > 1 - keyCompromise > 2 - caCompromise > 3 - affiliationChanged > 4 - superseded > 5 - cessationOfOperation > 6 - certificateHold > Any other number to finish Choice: > Enter value for the CRL Issuer name: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? >Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt7 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:51:c1 > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View > ,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:11:57 2013 > Not After : Fri Jun 07 00:11:57 2013 > Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie > w,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d7:0c:98:3f:50:05:8b:42:91:33:28:af:b5:cd:9f:ec: > 85:55:7b:93:ed:06:8d:53:e8:27:d7:ed:6b:c0:07:a9: > 61:3e:a6:a0:9d:04:6a:47:4a:3e:ef:fa:66:76:ac:99: > 95:5e:36:80:c2:57:bd:45:55:17:44:cd:17:8c:58:e2: > 9a:ca:b6:6b:a6:95:cc:5b:76:a4:0f:8c:c3:e4:25:74: > a7:a3:3a:6d:66:c8:cc:78:65:8d:56:60:30:f2:bd:8d: > b6:3b:0c:1e:5e:51:51:0b:06:af:60:49:c9:af:51:48: > 25:ac:4a:7c:5a:8e:e1:3e:72:0f:dd:7f:0b:9f:b7:e1 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: CRL Distribution Points > Distribution point: > RFC822 Name: "rfc822@name.tld" > DNS name: "test.com" > IP Address: > 87:07:31:2e:32:2e:33:2e:34 > Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 > Reasons: > 80 > (7 least significant bits unused) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > c2:02:63:c0:bd:10:1c:e8:93:fd:f7:0b:f8:2c:86:b5: > 28:c8:26:a8:44:89:17:07:53:1a:07:1f:94:d8:8c:07: > c3:6a:c2:c9:2c:5b:49:fe:e3:b4:ff:35:44:5c:30:61: > 5a:b6:f8:27:6d:74:5d:4b:8d:3c:60:2c:ab:01:8f:54: > 45:04:d0:e2:9b:d7:fd:cf:0e:0d:fd:c7:25:76:88:53: > 59:23:68:c0:7a:e3:bc:07:43:c2:23:60:ed:c1:a3:15: > 5e:cd:57:8c:70:32:1d:84:46:81:93:65:5d:2f:e8:23: > 5b:74:bc:4e:03:8a:1e:6d:af:32:5b:fa:16:8e:39:9b > Fingerprint (MD5): > E0:2A:EE:14:A8:F7:45:1F:C0:E0:77:0D:6D:E6:D1:9E > Fingerprint (SHA1): > AC:8D:F0:55:4B:7D:95:0E:05:2E:01:F9:27:D0:EC:22:A1:58:54:40 > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #138: CRL Distribution Points Extension (7) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args >certutil options: >2 >SN=asdfsdf >4 >3 >test.com >10 >n >n >Generating key. This may take a few moments... >Enter the type of the distribution point name: > 1 - Full Name > 2 - Relative Name > Any other number to finish > Choice: > Enter the relative name: >Select one of the following for the reason flags > 0 - unused > 1 - keyCompromise > 2 - caCompromise > 3 - affiliationChanged > 4 - superseded > 5 - cessationOfOperation > 6 - certificateHold > Any other number to finish Choice: > Enter value for the CRL Issuer name: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? >Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt8 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:51:c2 > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View > ,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:11:57 2013 > Not After : Fri Jun 07 00:11:57 2013 > Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie > w,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b6:03:ee:49:10:ee:72:00:ac:63:c8:29:7f:54:ee:22: > 58:e3:79:13:b7:7c:d5:c2:db:bf:5e:ec:da:46:fa:7e: > 04:fa:31:68:78:c8:c3:42:ea:98:1b:d2:6f:6c:c4:55: > fa:2c:e9:ed:16:87:56:7d:6f:2e:dd:5c:48:bc:ae:1a: > e6:5f:97:cf:52:fa:39:83:57:c9:af:7f:ef:3c:fb:07: > 42:06:31:dd:fe:66:61:8d:50:a5:85:c4:09:26:a3:83: > ee:93:0b:06:26:c8:1e:e9:80:19:03:df:f1:e3:de:dd: > 9c:b7:3a:17:26:bf:e2:07:a9:cc:a2:3e:4b:c5:36:63 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: CRL Distribution Points > Distribution point: > RDN: "SN=asdfsdf" > Reasons: > 08 > (7 least significant bits unused) > CRL issuer: > DNS name: "test.com" > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 26:93:a6:b1:13:85:c3:c2:9f:dc:11:69:e2:64:c0:14: > 90:0b:19:a9:c2:21:46:c4:cd:f7:8d:85:a4:b7:4a:46: > 6c:1b:a2:5c:8f:16:8d:be:f1:8f:3a:71:94:d2:c5:13: > ed:f6:b8:f4:39:b7:2c:8e:77:71:31:f3:a6:42:96:04: > 5d:75:b2:b2:93:02:ee:ed:d6:d5:cf:46:aa:be:2a:a5: > 80:93:d4:d6:a8:38:db:14:a9:6b:08:54:83:19:16:e8: > 4b:2e:4f:4b:fc:20:9a:43:d1:60:d0:f9:7f:15:00:ba: > e4:53:b7:8b:eb:59:81:98:7e:3d:1f:21:d3:ee:f7:21 > Fingerprint (MD5): > FF:80:66:3B:ED:17:7E:C8:A4:D0:9F:D4:1A:92:AC:59 > Fingerprint (SHA1): > 27:4A:99:11:72:CC:44:78:FA:66:C6:E9:01:CB:24:DD:CF:31:D8:3B > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #139: CRL Distribution Points Extension (8) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args >certutil options: >0 >1 >2 >10 >n >Generating key. This may take a few moments... > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt9 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:51:c2 > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View > ,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:11:58 2013 > Not After : Fri Jun 07 00:11:58 2013 > Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie > w,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ac:13:6d:14:19:19:b5:59:91:20:1b:31:72:df:e8:ee: > fc:85:e1:06:41:6d:fa:8e:8f:bd:d5:fb:45:91:cd:d7: > 7a:88:8d:fe:7f:04:37:ae:1e:8c:fd:c2:73:96:4f:54: > 04:f4:bc:52:e1:1d:0d:0f:78:32:56:eb:fc:27:98:72: > 42:78:6b:0d:22:ab:82:af:93:60:84:dc:84:0a:fb:8f: > 37:24:bc:be:ef:73:85:8b:63:6b:6a:aa:22:fd:19:7a: > 7f:ef:05:d6:f7:c9:7f:9f:ff:b4:7f:60:54:dd:c2:df: > 98:50:da:0d:01:41:9a:54:0e:c8:f5:49:53:07:3d:b1 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL Client,SSL Server,S/MIME> > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > a5:28:3f:54:b3:79:9d:43:9f:ee:df:a0:97:0d:b4:c8: > 64:58:c0:ce:81:95:2c:22:d9:c3:e0:78:8e:e9:64:c8: > 69:cf:20:ac:e1:33:3b:10:fb:c9:0b:dc:b7:46:a7:ec: > 2f:6e:9f:4c:d1:d8:db:ff:1a:16:70:76:5a:97:a6:9d: > f3:ba:47:54:90:60:3f:64:5d:73:29:30:7a:fd:77:b6: > 21:5f:6c:70:e2:4e:73:bd:4b:6f:ea:36:42:7e:11:27: > d6:38:44:70:14:c8:8d:dc:44:6d:6d:36:9e:c3:23:94: > 6c:f8:6e:b7:e2:92:b3:c4:be:82:92:4d:f0:6c:5d:30 > Fingerprint (MD5): > 04:71:B7:16:1D:36:C3:AA:3E:21:7F:9E:F7:38:32:1A > Fingerprint (SHA1): > DB:EC:C5:53:16:8D:D5:61:92:69:7F:4E:1B:BD:BA:2A:E3:1D:E0:AC > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #140: Certificate Type Extension (9) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args >certutil options: >0 >1 >2 >3 >4 >5 >6 >10 >y >Generating key. This may take a few moments... > 0 - Server Auth > 1 - Client Auth > 2 - Code Signing > 3 - Email Protection > 4 - Timestamp > 5 - OCSP Responder > 6 - Step-up > 7 - Microsoft Trust List Signing > Other to finish > > 0 - Server Auth > 1 - Client Auth > 2 - Code Signing > 3 - Email Protection > 4 - Timestamp > 5 - OCSP Responder > 6 - Step-up > 7 - Microsoft Trust List Signing > Other to finish > > 0 - Server Auth > 1 - Client Auth > 2 - Code Signing > 3 - Email Protection > 4 - Timestamp > 5 - OCSP Responder > 6 - Step-up > 7 - Microsoft Trust List Signing > Other to finish > > 0 - Server Auth > 1 - Client Auth > 2 - Code Signing > 3 - Email Protection > 4 - Timestamp > 5 - OCSP Responder > 6 - Step-up > 7 - Microsoft Trust List Signing > Other to finish > > 0 - Server Auth > 1 - Client Auth > 2 - Code Signing > 3 - Email Protection > 4 - Timestamp > 5 - OCSP Responder > 6 - Step-up > 7 - Microsoft Trust List Signing > Other to finish > > 0 - Server Auth > 1 - Client Auth > 2 - Code Signing > 3 - Email Protection > 4 - Timestamp > 5 - OCSP Responder > 6 - Step-up > 7 - Microsoft Trust List Signing > Other to finish > > 0 - Server Auth > 1 - Client Auth > 2 - Code Signing > 3 - Email Protection > 4 - Timestamp > 5 - OCSP Responder > 6 - Step-up > 7 - Microsoft Trust List Signing > Other to finish > > 0 - Server Auth > 1 - Client Auth > 2 - Code Signing > 3 - Email Protection > 4 - Timestamp > 5 - OCSP Responder > 6 - Step-up > 7 - Microsoft Trust List Signing > Other to finish > > Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt10 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:51:c2 > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi > ew,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:11:58 2013 > Not After : Fri Jun 07 00:11:58 2013 > Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V > iew,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b8:79:57:30:a7:01:ff:93:bb:8e:2f:96:de:33:e6:a3: > 42:5a:da:e9:65:4c:c6:e2:09:ed:39:37:09:97:ef:98: > c5:99:1c:92:31:68:5f:0b:54:f9:ba:70:14:5f:fc:66: > d7:0c:3e:47:48:88:7a:73:c4:b8:7d:8d:d8:95:04:15: > d5:2a:b0:ea:47:0c:bd:87:d1:fd:b5:94:9f:2a:37:f8: > 2d:b3:4a:1a:51:72:9a:c7:8d:0f:9c:41:87:26:4c:dd: > e2:e4:e9:51:18:15:29:dc:92:8c:90:9f:be:a0:93:b3: > fe:eb:32:98:0b:03:f4:3c:2e:77:3a:cf:de:e9:a0:69 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Extended Key Usage > Critical: True > TLS Web Server Authentication Certificate > TLS Web Client Authentication Certificate > Code Signing Certificate > E-Mail Protection Certificate > Time Stamping Certifcate > OCSP Responder Certificate > Strong Crypto Export Approved > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 86:54:ad:0d:98:c2:d3:3f:fa:aa:bb:3e:9a:c7:ee:4c: > ac:80:1d:f6:89:e8:7b:c8:41:62:23:68:b2:17:11:f1: > 4f:d2:8f:15:dc:76:09:b1:96:31:33:32:5b:a5:35:d6: > 4d:a7:ea:fe:d9:7d:f9:2a:14:53:95:00:bc:1e:3b:b9: > a9:24:d4:97:71:a3:99:43:7e:b5:43:c2:14:5c:e6:c5: > dc:5e:98:15:4d:3f:57:2f:09:9d:17:77:ba:68:83:28: > 9f:02:cf:e7:00:5d:6a:50:49:b6:2a:a9:b2:30:52:1a: > d4:39:3d:d5:56:78:e4:ee:a1:43:f4:80:76:e9:da:1b > Fingerprint (MD5): > 03:0F:66:CC:93:01:CF:8A:16:21:C5:9A:D5:58:F0:F5 > Fingerprint (SHA1): > 3A:3B:40:98:09:AB:A5:F9:CD:81:57:52:77:BD:DB:60:B5:DA:DA:87 > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #141: Extended Key Usage Extension (10) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args >certutil options: >1 >2 >3 >4 >5 >6 >10 >n >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt11 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:51:c3 > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi > ew,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:11:58 2013 > Not After : Fri Jun 07 00:11:58 2013 > Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V > iew,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c8:37:4e:b5:1c:5d:97:84:06:4c:b8:ba:c8:8b:6b:b3: > 97:f7:13:7d:56:b3:27:0c:37:62:9b:2f:89:0f:9f:70: > 68:18:a2:8d:0a:be:02:a3:6b:f9:db:dd:89:0a:38:b6: > b1:f8:a9:d9:f9:b3:cc:b9:0e:2f:c9:fd:b5:e7:8c:08: > b6:82:ef:55:76:4e:b5:aa:d4:e0:08:19:db:b2:da:ad: > c9:f5:9c:a4:3a:4d:e4:71:2e:b8:f2:f7:1f:b6:57:21: > af:ff:82:20:b3:12:20:f0:1b:01:c2:59:cc:37:f6:80: > 9c:35:a1:54:b0:c6:4d:e4:08:61:87:92:7d:da:d5:43 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Key Usage > Usages: Non-Repudiation > Key Encipherment > Data Encipherment > Key Agreement > Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 90:c5:43:ba:9b:3f:e1:4d:c3:05:e8:5b:58:31:05:ce: > 96:1e:ed:0e:32:09:09:9a:69:06:80:56:df:b5:c9:f5: > a8:16:e4:9d:df:3e:47:c0:ab:fc:17:61:49:eb:04:0b: > 07:3a:3d:ad:ba:95:ac:ad:54:b1:d6:6e:34:8d:f4:17: > de:c8:7a:13:1c:28:7a:51:e1:30:aa:5c:5a:e1:3e:79: > e4:76:25:0c:1a:fb:d5:f2:cb:b0:5c:43:28:23:03:9b: > f4:88:9f:1d:08:83:7c:46:eb:52:db:1e:a3:01:98:55: > 8f:9e:fb:1e:50:03:bc:6d:98:2a:b6:0a:7c:e5:d6:0d > Fingerprint (MD5): > E8:CE:7B:5E:2E:BE:41:17:EC:01:4D:BE:98:14:A9:AC > Fingerprint (SHA1): > F3:4E:53:ED:2B:EC:B0:F0:95:AB:2E:40:D5:E2:7C:C1:63:A2:B2:2A > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #142: Certificate Key Usage Extension (11) - PASSED >cert.sh: Create A Password Test Cert ============== >cert.sh: Create A Password Test Ca -------- >cert.sh: Creating a CA Certificate PasswordCA ========================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/dbpass >cert.sh: Creating CA Cert DB -------------------------- >certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/dbpass -f ../tests.pw >cert.sh: #143: Creating CA Cert DB - PASSED >cert.sh: Loading root cert module to CA Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/dbpass >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #144: Loading root cert module to CA Cert DB - PASSED >cert.sh: Certificate initialized ---------- >cert.sh: Creating CA Cert PasswordCA -------------------------- >certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >cert.sh: #145: Creating CA Cert PasswordCA - PASSED >cert.sh: Exporting Root Cert -------------------------- >certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/dbpass -o root.cert >cert.sh: #146: Exporting Root Cert - PASSED >cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- >certutil -W -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/dbpass -f ../tests.pw -@ ../tests.fipspw >Password changed successfully. >cert.sh: #147: Changing password on Password Test Cert's Cert DB - PASSED >cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- >certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/dbpass -f ../tests.fipspw -z ../tests_noise >Generating key. This may take a few moments... >cert.sh: #148: Generate Certificate for Password Test Cert with new password - PASSED >cert.sh SUCCESS: PASSWORD passed >cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- >certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/dbpass -f ../tests.fipspw >certutil: certificate is valid >cert.sh: #149: Verify Certificate for Password Test Cert with new password - PASSED >cert.sh: Creating Distrusted Certificate >cert.sh: Initializing Distrusted's Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw >cert.sh: #150: Initializing Distrusted's Cert DB - PASSED >cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #151: Loading root cert module to Distrusted's Cert DB - PASSED >cert.sh: Import Root CA for Distrusted -------------------------- >certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -i ../CA/TestCA.ca.cert >cert.sh: #152: Import Root CA for Distrusted - PASSED >cert.sh: Generate Cert Request for Distrusted -------------------------- >certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #153: Generate Cert Request for Distrusted - PASSED >cert.sh: Sign Distrusted's Request -------------------------- >certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw >cert.sh: #154: Sign Distrusted's Request - PASSED >cert.sh: Import Distrusted's Cert -------------------------- >certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted.cert >cert.sh: #155: Import Distrusted's Cert - PASSED >cert.sh SUCCESS: Distrusted's Cert Created >cert.sh: Mark CERT as unstrusted -------------------------- >certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw >cert.sh: #156: Mark CERT as unstrusted - PASSED >cert.sh: Creating Distrusted Intermediate >cert.sh: Creating a CA Certificate DistrustedCA ========================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/CA >cert.sh: Creating CA Cert DistrustedCA -------------------------- >certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >cert.sh: #157: Creating CA Cert DistrustedCA - PASSED >cert.sh: Exporting Root Cert -------------------------- >certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/CA -o root.cert >cert.sh: #158: Exporting Root Cert - PASSED >cert.sh: Import Distrusted Intermediate -------------------------- >certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -i ../CA/DistrustedCA.ca.cert >cert.sh: #159: Import Distrusted Intermediate - PASSED >cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- >certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #160: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED >cp: './req' and '/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/CA/req' are the same file >cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- >certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw >cert.sh: #161: Sign LeafChainedToDistrustedCA's Request - PASSED >cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- >certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert >cert.sh: #162: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED >cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- >certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw >certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. >cert.sh: #163: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED >cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- >certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw >certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. >cert.sh: #164: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED >cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- >certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw >certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. >cert.sh: #165: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED >cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- >certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw >certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. >cert.sh: #166: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED >cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- >certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw >certutil: certificate is invalid: Certificate type not approved for application. >cert.sh: #167: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED >cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- >certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw >certutil: certificate is invalid: Certificate type not approved for application. >cert.sh: #168: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED >cert.sh: Verify Distrusted Cert for SSL Server -------------------------- >certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw >certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. >cert.sh: #169: Verify Distrusted Cert for SSL Server - PASSED >cert.sh: Verify Distrusted Cert for SSL Client -------------------------- >certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw >certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. >cert.sh: #170: Verify Distrusted Cert for SSL Client - PASSED >cert.sh: Verify Distrusted Cert for Email signer -------------------------- >certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw >certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. >cert.sh: #171: Verify Distrusted Cert for Email signer - PASSED >cert.sh: Verify Distrusted Cert for Email recipient -------------------------- >certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw >certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. >cert.sh: #172: Verify Distrusted Cert for Email recipient - PASSED >cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- >certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw >certutil: certificate is invalid: Certificate type not approved for application. >cert.sh: #173: Verify Distrusted Cert for OCSP responder - PASSED >cert.sh: Verify Distrusted Cert for Object Signer -------------------------- >certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw >certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. >cert.sh: #174: Verify Distrusted Cert for Object Signer - PASSED >cert.sh: OCSP response creation selftest >cert.sh: perform selftest -------------------------- >ocspresp /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/serverCA serverCA chain-1-serverCA -f ../tests.pw >cert.sh: #175: perform selftest - PASSED >cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === >cert.sh: Generate Cert Request for TestUser40 -------------------------- >certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #176: Generate Cert Request for TestUser40 - PASSED >cert.sh: Sign TestUser40's Request -------------------------- >certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw >cert.sh: #177: Sign TestUser40's Request - PASSED >cert.sh: Import TestUser40's Cert -------------------------- >certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40.cert >cert.sh: #178: Import TestUser40's Cert - PASSED >cert.sh SUCCESS: TestUser40's Cert Created >cert.sh: Generate Cert Request for TestUser41 -------------------------- >certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #179: Generate Cert Request for TestUser41 - PASSED >cert.sh: Sign TestUser41's Request -------------------------- >certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw >cert.sh: #180: Sign TestUser41's Request - PASSED >cert.sh: Import TestUser41's Cert -------------------------- >certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41.cert >cert.sh: #181: Import TestUser41's Cert - PASSED >cert.sh SUCCESS: TestUser41's Cert Created >cert.sh: Generate Cert Request for TestUser42 -------------------------- >certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #182: Generate Cert Request for TestUser42 - PASSED >cert.sh: Sign TestUser42's Request -------------------------- >certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw >cert.sh: #183: Sign TestUser42's Request - PASSED >cert.sh: Import TestUser42's Cert -------------------------- >certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42.cert >cert.sh: #184: Import TestUser42's Cert - PASSED >cert.sh SUCCESS: TestUser42's Cert Created >cert.sh: Generate Cert Request for TestUser43 -------------------------- >certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #185: Generate Cert Request for TestUser43 - PASSED >cert.sh: Sign TestUser43's Request -------------------------- >certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw >cert.sh: #186: Sign TestUser43's Request - PASSED >cert.sh: Import TestUser43's Cert -------------------------- >certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43.cert >cert.sh: #187: Import TestUser43's Cert - PASSED >cert.sh SUCCESS: TestUser43's Cert Created >cert.sh: Generate Cert Request for TestUser44 -------------------------- >certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #188: Generate Cert Request for TestUser44 - PASSED >cert.sh: Sign TestUser44's Request -------------------------- >certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw >cert.sh: #189: Sign TestUser44's Request - PASSED >cert.sh: Import TestUser44's Cert -------------------------- >certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44.cert >cert.sh: #190: Import TestUser44's Cert - PASSED >cert.sh SUCCESS: TestUser44's Cert Created >cert.sh: Generate Cert Request for TestUser45 -------------------------- >certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #191: Generate Cert Request for TestUser45 - PASSED >cert.sh: Sign TestUser45's Request -------------------------- >certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw >cert.sh: #192: Sign TestUser45's Request - PASSED >cert.sh: Import TestUser45's Cert -------------------------- >certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45.cert >cert.sh: #193: Import TestUser45's Cert - PASSED >cert.sh SUCCESS: TestUser45's Cert Created >cert.sh: Generate Cert Request for TestUser46 -------------------------- >certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #194: Generate Cert Request for TestUser46 - PASSED >cert.sh: Sign TestUser46's Request -------------------------- >certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw >cert.sh: #195: Sign TestUser46's Request - PASSED >cert.sh: Import TestUser46's Cert -------------------------- >certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46.cert >cert.sh: #196: Import TestUser46's Cert - PASSED >cert.sh SUCCESS: TestUser46's Cert Created >cert.sh: Generate Cert Request for TestUser47 -------------------------- >certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #197: Generate Cert Request for TestUser47 - PASSED >cert.sh: Sign TestUser47's Request -------------------------- >certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw >cert.sh: #198: Sign TestUser47's Request - PASSED >cert.sh: Import TestUser47's Cert -------------------------- >certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47.cert >cert.sh: #199: Import TestUser47's Cert - PASSED >cert.sh SUCCESS: TestUser47's Cert Created >cert.sh: Generate Cert Request for TestUser48 -------------------------- >certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #200: Generate Cert Request for TestUser48 - PASSED >cert.sh: Sign TestUser48's Request -------------------------- >certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw >cert.sh: #201: Sign TestUser48's Request - PASSED >cert.sh: Import TestUser48's Cert -------------------------- >certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48.cert >cert.sh: #202: Import TestUser48's Cert - PASSED >cert.sh SUCCESS: TestUser48's Cert Created >cert.sh: Generate Cert Request for TestUser49 -------------------------- >certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #203: Generate Cert Request for TestUser49 - PASSED >cert.sh: Sign TestUser49's Request -------------------------- >certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw >cert.sh: #204: Sign TestUser49's Request - PASSED >cert.sh: Import TestUser49's Cert -------------------------- >certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49.cert >cert.sh: #205: Import TestUser49's Cert - PASSED >cert.sh SUCCESS: TestUser49's Cert Created >cert.sh: Generate Cert Request for TestUser50 -------------------------- >certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #206: Generate Cert Request for TestUser50 - PASSED >cert.sh: Sign TestUser50's Request -------------------------- >certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw >cert.sh: #207: Sign TestUser50's Request - PASSED >cert.sh: Import TestUser50's Cert -------------------------- >certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50.cert >cert.sh: #208: Import TestUser50's Cert - PASSED >cert.sh SUCCESS: TestUser50's Cert Created >cert.sh: Generate Cert Request for TestUser51 -------------------------- >certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #209: Generate Cert Request for TestUser51 - PASSED >cert.sh: Sign TestUser51's Request -------------------------- >certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw >cert.sh: #210: Sign TestUser51's Request - PASSED >cert.sh: Import TestUser51's Cert -------------------------- >certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51.cert >cert.sh: #211: Import TestUser51's Cert - PASSED >cert.sh SUCCESS: TestUser51's Cert Created >cert.sh: Generate Cert Request for TestUser52 -------------------------- >certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #212: Generate Cert Request for TestUser52 - PASSED >cert.sh: Sign TestUser52's Request -------------------------- >certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw >cert.sh: #213: Sign TestUser52's Request - PASSED >cert.sh: Import TestUser52's Cert -------------------------- >certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52.cert >cert.sh: #214: Import TestUser52's Cert - PASSED >cert.sh SUCCESS: TestUser52's Cert Created >cert.sh: Creating CA CRL ===================================== >cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- >crlutil -q -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or >cert.sh: #215: Generating CRL for range 40-42 TestCA authority - PASSED >cert.sh: Modifying CA CRL by adding one more cert ============ >cert.sh: Modify CRL by adding one more cert -------------------------- >crlutil -q -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or >cert.sh: #216: Modify CRL by adding one more cert - PASSED >cert.sh: Modifying CA CRL by removing one cert =============== >cert.sh: Modify CRL by removing one cert -------------------------- >crlutil -q -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 >cert.sh: #217: Modify CRL by removing one cert - PASSED >cert.sh: Creating CA CRL for groups 1 and 2 =============== >cert.sh: Creating CRL for groups 1 and 2 -------------------------- >crlutil -q -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 >cert.sh: #218: Creating CRL for groups 1 and 2 - PASSED >cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== >cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- >crlutil -q -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 >cert.sh: #219: Creating CRL for groups 1, 2 and 3 - PASSED >cert.sh: Importing Server CA Issued CRL for certs trough 52 >cert.sh: Importing CRL for groups 1 -------------------------- >crlutil -q -D -n TestCA -f ../tests.pw -d ../server >crlutil: could not find TestCA's CRL: No matching CRL was found. >crlutil: could not find the issuer TestCA's CRL: No matching CRL was found. >cert.sh: #220: Importing CRL for groups 1 - PASSED >cert.sh: Importing CRL for groups 1 -------------------------- >crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server >cert.sh: #221: Importing CRL for groups 1 - PASSED >cert.sh SUCCESS: SSL CRL prep passed >cert.sh cert.sh: finished cert.sh >TIMESTAMP cert END: Wed Mar 6 17:12:11 MST 2013 >Running tests for dbtests >TIMESTAMP dbtests BEGIN: Wed Mar 6 17:12:11 MST 2013 >./dbtests.sh: line 173: syntax error near unexpected token `then' >./dbtests.sh: line 173: ` if [[ $EUID -ne 0 ]] then' >TIMESTAMP dbtests END: Wed Mar 6 17:12:11 MST 2013 >Running tests for tools >TIMESTAMP tools BEGIN: Wed Mar 6 17:12:11 MST 2013 >tools.sh: Tools Tests =============================== >tools.sh: Exporting Alice's email cert & key - default ciphers >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #222: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 54:c4:75:88:a1:25:a3:95:6f:5a:05:b6:e5:29:d2:6b > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #223: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #224: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #225: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC > Parameters: > Salt: > 20:10:88:ca:f7:51:30:b4:f2:34:30:95:67:82:ac:46 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #226: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #227: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #228: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC > Parameters: > Salt: > b5:63:f1:b8:0c:9e:26:74:1e:00:7a:53:44:5a:fb:25 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #229: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #230: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #231: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC > Parameters: > Salt: > 5d:78:19:53:13:b2:98:ae:1c:dc:ad:a6:ed:fd:e6:e6 > Iteration Count: 2000 (0x7d0) >tools.sh: #232: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #233: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #234: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 8c:fd:57:f1:48:55:bc:ae:5a:e6:92:6a:86:bf:42:a3 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #235: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #236: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #237: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 7c:aa:30:be:ef:8f:6d:89:74:a4:42:de:a0:c0:e9:8e > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #238: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #239: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #240: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 71:23:da:78:62:32:a6:26:11:c5:bf:13:b5:41:30:3c > Iteration Count: 2000 (0x7d0) >tools.sh: #241: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #242: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #243: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 82:67:44:3b:82:d0:20:09:67:03:5a:05:d5:cf:54:5d > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-128-CBC > Args: > 04:10:78:4a:87:64:e8:46:6f:5c:87:76:6b:07:f6:7c: > e4:93 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #244: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #245: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #246: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > f0:c8:b1:32:e3:37:67:26:88:84:2d:f2:39:6f:c6:c9 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-128-CBC > Args: > 04:10:ff:6f:f8:3f:2b:2b:de:2b:88:d0:1d:9a:33:b9: > fc:e0 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #247: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #248: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #249: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 94:21:88:d7:c1:7f:67:9f:41:8c:cf:7a:79:2c:89:fd > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-128-CBC > Args: > 04:10:cc:93:5a:e2:9e:0c:57:42:ff:b3:22:2c:b7:17: > 53:55 >tools.sh: #250: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #251: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #252: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 94:f5:7d:47:34:d7:a8:f1:91:38:13:ed:dd:8f:80:43 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-192-CBC > Args: > 04:10:ff:47:6b:6d:6c:7b:63:db:a0:86:bf:24:38:1d: > 3f:a6 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #253: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #254: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #255: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 18:68:cc:e6:25:24:bd:ab:2b:75:31:12:20:62:3c:ff > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-192-CBC > Args: > 04:10:0d:47:33:59:70:07:21:fb:b2:e3:7b:0c:80:2d: > 18:44 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #256: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #257: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #258: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > b4:ed:15:e8:8d:2d:c7:4d:e5:bd:41:c2:54:0a:f4:2f > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-192-CBC > Args: > 04:10:e0:09:40:c5:87:49:1a:ed:1c:82:a9:20:bc:66: > a0:fd >tools.sh: #259: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #260: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #261: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 7e:3e:56:60:9c:60:d8:56:cc:9b:06:fa:21:3a:6f:3c > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-256-CBC > Args: > 04:10:84:07:18:c7:29:b4:d5:42:21:2d:8f:5a:2c:df: > ac:0b >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #262: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #263: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #264: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > e0:84:85:dd:a9:77:c1:9e:6f:3d:23:04:5f:1a:3a:8a > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-256-CBC > Args: > 04:10:e6:93:67:f8:5e:8b:f0:d4:ca:d1:da:c3:6a:8c: > e1:90 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #265: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #266: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #267: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 40:47:d1:1b:4b:6c:22:d6:92:a4:89:3d:c3:eb:d6:d0 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-256-CBC > Args: > 04:10:c3:1d:92:69:94:4a:56:d0:34:29:66:fa:32:04: > 63:f9 >tools.sh: #268: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #269: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #270: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 46:b3:e0:9f:84:3d:f9:aa:f5:fe:f4:ed:4e:e9:20:e9 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-128-CBC > Args: > 04:10:fd:9f:3c:34:8a:d2:e8:1b:9f:1a:86:c7:0d:5e: > 81:ea >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #271: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #272: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #273: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 92:b6:cf:a3:c8:47:70:b2:e9:7c:70:92:a1:1d:3f:0f > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-128-CBC > Args: > 04:10:f6:54:6f:9a:76:71:75:f9:9a:46:c4:46:eb:3d: > 3d:54 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #274: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #275: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #276: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 03:f7:55:26:c4:59:d8:1e:f1:34:68:f3:ca:94:3a:43 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-128-CBC > Args: > 04:10:ba:b8:5d:94:66:08:91:b6:c8:1e:b4:65:35:6b: > 65:ca >tools.sh: #277: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #278: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #279: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 89:42:22:14:02:f9:15:20:72:e3:f0:cf:40:c3:13:97 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-192-CBC > Args: > 04:10:88:fe:77:9d:0f:54:54:20:7d:aa:5c:ce:bb:0c: > 4f:80 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #280: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #281: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #282: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 0e:29:86:1b:ba:02:0b:84:d1:fb:75:64:31:b0:ea:a6 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-192-CBC > Args: > 04:10:89:5b:c8:65:61:01:cf:d7:06:e9:7c:cd:84:4d: > 63:61 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #283: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #284: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #285: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 6e:72:bc:89:29:0f:1f:b8:b2:07:96:d5:c7:43:90:7d > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-192-CBC > Args: > 04:10:25:67:94:bb:de:37:86:90:30:40:c8:d4:d2:18: > 28:e8 >tools.sh: #286: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #287: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #288: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > e6:63:85:82:e9:d5:e7:45:57:91:29:a1:b0:5b:11:ac > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-256-CBC > Args: > 04:10:db:b7:cd:0f:9c:5b:f3:12:c6:18:79:a4:9a:e9: > 64:f1 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #289: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #290: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #291: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > b7:8b:e1:7b:e1:69:bf:6b:78:83:1f:36:8c:c9:1d:c1 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-256-CBC > Args: > 04:10:aa:f0:ef:37:f2:50:57:cd:5a:13:6d:9c:50:13: > 39:6b >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #292: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #293: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #294: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 36:72:f3:ba:ca:e1:bd:2e:13:5f:23:3d:48:b3:9d:a2 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-256-CBC > Args: > 04:10:07:9e:2d:39:ba:90:8e:11:64:05:af:7b:4c:d0: > 42:ee >tools.sh: #295: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #296: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #297: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC > Parameters: > Salt: > 12:49:1a:08:a3:c9:39:4f:88:3a:95:e8:dc:28:56:a5 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #298: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #299: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #300: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC > Parameters: > Salt: > 17:d4:1a:14:41:95:c7:18:97:9d:95:95:54:7c:7e:26 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #301: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #302: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #303: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC > Parameters: > Salt: > ed:e4:ac:b8:7a:e7:e9:7c:70:dc:75:b1:30:fe:37:69 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #304: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #305: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #306: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC > Parameters: > Salt: > eb:97:a4:ea:4f:1a:6e:3d:d0:a8:63:7c:49:5a:f4:98 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #307: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #308: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #309: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC > Parameters: > Salt: > 1a:db:29:c0:a5:43:1a:9b:48:75:49:0d:9e:a1:7e:32 > Iteration Count: 2000 (0x7d0) >tools.sh: #310: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #311: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #312: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC > Parameters: > Salt: > 5b:ad:ce:74:f8:59:db:e7:fb:0f:28:dc:e1:9b:5c:1a > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #313: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #314: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #315: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC > Parameters: > Salt: > 27:3d:1c:ba:ac:3b:25:65:dd:a5:38:90:10:b0:1f:e8 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #316: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #317: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #318: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC > Parameters: > Salt: > b6:63:d1:5d:53:e7:7b:bf:64:2b:ef:88:52:49:fe:cf > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #319: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #320: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #321: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC > Parameters: > Salt: > 11:bf:91:aa:2b:dc:7e:22:76:94:d9:5b:7e:e1:b6:2d > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #322: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #323: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #324: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC > Parameters: > Salt: > 87:a1:a2:80:83:16:67:6f:11:ba:1b:24:f6:26:23:d3 > Iteration Count: 2000 (0x7d0) >tools.sh: #325: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #326: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #327: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC > Parameters: > Salt: > e9:7f:e3:3f:c7:da:97:86:2a:18:44:b7:69:41:74:00 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #328: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #329: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #330: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC > Parameters: > Salt: > 28:02:37:32:68:d3:8c:f9:13:74:96:e8:c4:bb:c9:b6 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #331: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #332: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #333: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC > Parameters: > Salt: > be:c1:0d:a4:e4:b5:f2:2a:a7:d8:bb:65:31:f9:20:ba > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #334: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #335: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #336: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC > Parameters: > Salt: > 97:51:e4:25:f9:45:da:0e:40:ad:d2:38:b7:f5:59:8c > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #337: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #338: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #339: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC > Parameters: > Salt: > 73:13:a6:ad:15:66:cc:70:ea:f7:25:b6:30:9e:d3:b6 > Iteration Count: 2000 (0x7d0) >tools.sh: #340: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #341: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #342: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > d2:ca:8d:8a:fe:78:9d:a8:a7:82:3d:4d:c5:cc:f8:cf > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #343: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #344: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #345: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 56:8d:f2:62:46:67:e3:50:8a:44:8b:da:a8:c4:f7:86 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #346: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #347: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #348: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 09:92:e8:60:05:ab:2e:7c:b6:d0:05:09:ab:f9:63:c7 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #349: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #350: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #351: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 9c:69:87:56:24:32:f1:3c:8d:bc:51:30:d8:2d:a3:02 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #352: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #353: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [default:null] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #354: Exporting with [default:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > a7:7d:e9:a0:66:b1:65:f9:79:47:31:d6:03:a7:fd:a0 > Iteration Count: 2000 (0x7d0) >tools.sh: #355: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #356: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #357: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > e5:bd:6f:b0:b7:5f:41:04:24:4d:a3:af:a7:14:9b:27 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #358: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #359: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #360: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 54:5a:83:3f:02:d8:d7:7d:23:f0:9c:d1:5e:ce:15:ab > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #361: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #362: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #363: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > c4:1b:18:26:b1:e9:dc:03:54:a2:c0:aa:e3:fb:79:58 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #364: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #365: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #366: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 19:f7:18:c7:46:ac:59:cf:f7:a0:29:b5:8f:49:8b:8b > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #367: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #368: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #369: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 75:ff:99:4d:a9:0c:38:b5:60:5a:3d:88:a6:d0:8d:51 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #370: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #371: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #372: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > ef:b4:19:e6:d0:79:08:6d:70:32:7b:1b:82:f7:54:3e > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #373: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #374: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #375: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 00:81:54:4b:e8:68:77:80:74:df:8b:8d:44:09:67:0b > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #376: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #377: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #378: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 62:4f:a2:46:49:f3:c9:e8:27:6a:00:48:ca:58:0e:c3 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #379: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #380: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #381: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > de:d6:24:f0:00:67:02:b6:f4:f3:db:9e:d0:c6:65:ca > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #382: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #383: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #384: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 5d:04:0c:a1:46:1c:fb:de:ab:52:2f:d2:94:42:49:c5 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #385: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #386: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c null >pk12util: Algorithm: "null": security library: invalid algorithm. >tools.sh: #387: Exporting with [null:default] (pk12util -o) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #388: Exporting with [default:null] (pk12util -o) - PASSED >tools.sh: Create objsign cert ------------------------------- >signtool -G "objectsigner" -d ../tools/signdir -p "nss" >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit the browser before continuing this operation. Enter >"y" to continue, or anything else to abort: >Enter certificate information. All fields are optional. Acceptable >characters are numbers, letters, spaces, and apostrophes. >certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair >certificate request generated >certificate has been signed >certificate "objsigner" added to database >Exported certificate to x509.raw and x509.cacert. >tools.sh: #389: Create objsign cert (signtool -G) - PASSED >tools.sh: Signing a jar of files ---------------------------- >signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ > ../tools/html >Generating ../tools/html/META-INF/manifest.mf file.. >--> sign.html >adding ../tools/html/sign.html to nojs.jar...(deflated 26%) >--> signjs.html >adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) >Generating zigbert.sf file.. >adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) >adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) >adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) >tree "../tools/html" signed successfully >tools.sh: #390: Signing a jar of files (signtool -Z) - PASSED >tools.sh: Listing signed files in jar ---------------------- >signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner >archive "nojs.jar" has passed crypto verification. >found a MF master manifest file: META-INF/manifest.mf >found a SF signature manifest file: META-INF/zigbert.sf > md5 digest on global metainfo: match > sha digest on global metainfo: match >found a RSA signature file: META-INF/zigbert.rsa > status path > ------------ ------------------- > verified sign.html > verified signjs.html >tools.sh: #391: Listing signed files in jar (signtool -v) - PASSED >tools.sh: Show who signed jar ------------------------------ >signtool -w nojs.jar -d ../tools/signdir >Signer information: >nickname: objsigner >subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org >issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org >tools.sh: #392: Show who signed jar (signtool -w) - PASSED >tools.sh: Signing a xpi of files ---------------------------- >signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ > ../tools/html >Generating ../tools/html/META-INF/manifest.mf file.. >--> sign.html >--> signjs.html >Generating zigbert.sf file.. >Creating XPI Compatible Archive >adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) >--> sign.html >adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) >--> signjs.html >adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) >adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) >adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) >tree "../tools/html" signed successfully >tools.sh: #393: Signing a xpi of files (signtool -Z -X) - PASSED >tools.sh: Listing signed files in xpi ---------------------- >signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner >archive "nojs.xpi" has passed crypto verification. >found a RSA signature file: META-INF/zigbert.rsa >found a MF master manifest file: META-INF/manifest.mf >found a SF signature manifest file: META-INF/zigbert.sf > md5 digest on global metainfo: match > sha digest on global metainfo: match > status path > ------------ ------------------- > verified sign.html > verified signjs.html >tools.sh: #394: Listing signed files in xpi (signtool -v) - PASSED >tools.sh: Show who signed xpi ------------------------------ >signtool -w nojs.xpi -d ../tools/signdir >Signer information: >nickname: objsigner >subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org >issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org >tools.sh: #395: Show who signed xpi (signtool -w) - PASSED >TIMESTAMP tools END: Wed Mar 6 17:12:16 MST 2013 >Running tests for fips >TIMESTAMP fips BEGIN: Wed Mar 6 17:12:16 MST 2013 >fips.sh: FIPS 140 Compliance Tests =============================== >fips.sh: Verify this module is in FIPS mode ----------------- >modutil -dbdir ../fips -list >Listing of PKCS #11 Modules >----------------------------------------------------------- > 1. NSS Internal FIPS PKCS #11 Module > slots: 1 slot attached > status: loaded > slot: NSS FIPS 140-2 User Private Key Services > token: NSS FIPS 140-2 Certificate DB > 2. RootCerts > library name: /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so > slots: 1 slot attached > status: loaded > slot: NSS Builtin Objects > token: Builtin Object Token >----------------------------------------------------------- >FIPS mode enabled. >fips.sh: #396: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED >fips.sh: List the FIPS module certificates ----------------- >certutil -d ../fips -L >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >FIPS_PUB_140_Test_Certificate Cu,Cu,Cu >fips.sh: #397: List the FIPS module certificates (certutil -L) . - PASSED >fips.sh: List the FIPS module keys ------------------------- >certutil -d ../fips -K -f ../tests.fipspw >certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" >< 0> dsa db9f30080d662d64f18f41967f827a71adc941a7 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate >fips.sh: #398: List the FIPS module keys (certutil -K) . - PASSED >fips.sh: Attempt to list FIPS module keys with incorrect password >certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests.fipsbadpw >certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" >Incorrect password/PIN entered. >certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect. >fips.sh: #399: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED >certutil -K returned 255 >fips.sh: Validate the certificate -------------------------- >certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw >certutil: certificate is valid >fips.sh: #400: Validate the certificate (certutil -V -e) . - PASSED >fips.sh: Export the certificate and key as a PKCS#12 file -- >pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw >pk12util: PKCS12 EXPORT SUCCESSFUL >fips.sh: #401: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED >fips.sh: Export the certificate as a DER-encoded file ------ >certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt >fips.sh: #402: Export the certificate as a DER (certutil -L -r) . - PASSED >fips.sh: List the FIPS module certificates ----------------- >certutil -d ../fips -L >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >FIPS_PUB_140_Test_Certificate Cu,Cu,Cu >fips.sh: #403: List the FIPS module certificates (certutil -L) . - PASSED >fips.sh: Delete the certificate and key from the FIPS module >certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw >fips.sh: #404: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED >fips.sh: List the FIPS module certificates ----------------- >certutil -d ../fips -L >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >fips.sh: #405: List the FIPS module certificates (certutil -L) . - PASSED >fips.sh: List the FIPS module keys. >certutil -d ../fips -K -f ../tests.fipspw >certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" >certutil: no keys found >fips.sh: #406: List the FIPS module keys (certutil -K) . - PASSED >fips.sh: Import the certificate and key from the PKCS#12 file >pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw >pk12util: PKCS12 IMPORT SUCCESSFUL >fips.sh: #407: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED >fips.sh: List the FIPS module certificates ----------------- >certutil -d ../fips -L >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >FIPS_PUB_140_Test_Certificate u,u,u >fips.sh: #408: List the FIPS module certificates (certutil -L) . - PASSED >fips.sh: List the FIPS module keys -------------------------- >certutil -d ../fips -K -f ../tests.fipspw >certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" >< 0> dsa db9f30080d662d64f18f41967f827a71adc941a7 FIPS_PUB_140_Test_Certificate >fips.sh: #409: List the FIPS module keys (certutil -K) . - PASSED >fips.sh: Delete the certificate from the FIPS module >certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate >fips.sh: #410: Delete the certificate from the FIPS module (certutil -D) . - PASSED >fips.sh: List the FIPS module certificates ----------------- >certutil -d ../fips -L >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >fips.sh: #411: List the FIPS module certificates (certutil -L) . - PASSED >fips.sh: Import the certificate and key from the PKCS#12 file >pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw >pk12util: PKCS12 IMPORT SUCCESSFUL >fips.sh: #412: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED >fips.sh: List the FIPS module certificates ----------------- >certutil -d ../fips -L >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >FIPS_PUB_140_Test_Certificate u,u,u >fips.sh: #413: List the FIPS module certificates (certutil -L) . - PASSED >fips.sh: List the FIPS module keys -------------------------- >certutil -d ../fips -K -f ../tests.fipspw >certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" >< 0> dsa db9f30080d662d64f18f41967f827a71adc941a7 FIPS_PUB_140_Test_Certificate >fips.sh: #414: List the FIPS module keys (certutil -K) . - PASSED >fips.sh: Run PK11MODE in FIPSMODE ----------------- >pk11mode -d ../fips -p fips- -f ../tests.fipspw >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >**** Total number of TESTS ran in FIPS MODE is 106. **** >**** ALL TESTS PASSED **** >fips.sh: #415: Run PK11MODE in FIPS mode (pk11mode) . - PASSED >fips.sh: Run PK11MODE in Non FIPSMODE ----------------- >pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >**** Total number of TESTS ran in NON FIPS MODE is 104. **** >**** ALL TESTS PASSED **** >fips.sh: #416: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED >mkdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.chk /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssdbm.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssdbm3.chk /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssdbm3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssutil.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.chk /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle >fips.sh: Detect mangled softoken-------------------------- >mangling /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so >mangle -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so -o -8 -b 5 >Changing byte 0x0015dc48 (1432648): from 5f (95) to 7f (127) >LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/fips/mangle dbtest -r -d ../fips >fips.sh: #417: Init NSS with a corrupted library (dbtest -r) . - PASSED >fips.sh done >TIMESTAMP fips END: Wed Mar 6 17:12:28 MST 2013 >Running tests for sdr >TIMESTAMP sdr BEGIN: Wed Mar 6 17:12:28 MST 2013 >sdr.sh: SDR Tests =============================== >sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 >sdrtest -d . -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests.v1.17100 -t "Test1" >sdr.sh: #418: Creating SDR Key/Encrypt - Value 1 - PASSED >sdr.sh: SDR Encrypt - Value 2 >sdrtest -d . -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests.v2.17100 -t "The quick brown fox jumped over the lazy dog" >sdr.sh: #419: Encrypt - Value 2 - PASSED >sdr.sh: SDR Encrypt - Value 3 >sdrtest -d . -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests.v3.17100 -t "1234567" >sdr.sh: #420: Encrypt - Value 3 - PASSED >sdr.sh: SDR Decrypt - Value 1 >sdrtest -d . -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests.v1.17100 -t "Test1" >sdr.sh: #421: Decrypt - Value 1 - PASSED >sdr.sh: SDR Decrypt - Value 2 >sdrtest -d . -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests.v2.17100 -t "The quick brown fox jumped over the lazy dog" >sdr.sh: #422: Decrypt - Value 2 - PASSED >sdr.sh: SDR Decrypt - Value 3 >sdrtest -d . -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests.v3.17100 -t "1234567" >sdr.sh: #423: Decrypt - Value 3 - PASSED >TIMESTAMP sdr END: Wed Mar 6 17:12:28 MST 2013 >Running tests for crmf >TIMESTAMP crmf BEGIN: Wed Mar 6 17:12:28 MST 2013 >crmf.sh: CRMF/CMMF Tests =============================== >crmf.sh: CRMF/CMMF Tests ------------------------------ >crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode >crmftest v1.0 >Generating CRMF request >Decoding CRMF request >crmftest: Processing cert request 0 >crmftest: Processing cert request 1 >Exiting successfully!!! >crmf.sh: #424: CRMF test . - PASSED >crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf >crmftest v1.0 >Doing CMMF Stuff >Exiting successfully!!! >crmf.sh: #425: CMMF test . - PASSED >TIMESTAMP crmf END: Wed Mar 6 17:12:28 MST 2013 >Running tests for smime >TIMESTAMP smime BEGIN: Wed Mar 6 17:12:28 MST 2013 >smime.sh: S/MIME Tests =============================== >smime.sh: Signing Detached Message {SHA1} ------------------ >cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 >smime.sh: #426: Create Detached Signature Alice (SHA1) . - PASSED >cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir >Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) >From: alice@bogus.com >Subject: message Alice --> Bob >To: bob@bogus.com >This is a test message from Alice to Bob. >smime.sh: #427: Verifying Alice's Detached Signature (SHA1) . - PASSED >smime.sh: Signing Attached Message (SHA1) ------------------ >cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 >smime.sh: #428: Create Attached Signature Alice (SHA1) . - PASSED >cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 >smime.sh: #429: Decode Alice's Attached Signature (SHA1) . - PASSED >diff alice.txt alice.data.SHA1 >smime.sh: #430: Compare Attached Signed Data and Original (SHA1) . - PASSED >smime.sh: Signing Detached Message {SHA256} ------------------ >cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 >smime.sh: #431: Create Detached Signature Alice (SHA256) . - PASSED >cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir >Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) >From: alice@bogus.com >Subject: message Alice --> Bob >To: bob@bogus.com >This is a test message from Alice to Bob. >smime.sh: #432: Verifying Alice's Detached Signature (SHA256) . - PASSED >smime.sh: Signing Attached Message (SHA256) ------------------ >cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 >smime.sh: #433: Create Attached Signature Alice (SHA256) . - PASSED >cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 >smime.sh: #434: Decode Alice's Attached Signature (SHA256) . - PASSED >diff alice.txt alice.data.SHA256 >smime.sh: #435: Compare Attached Signed Data and Original (SHA256) . - PASSED >smime.sh: Signing Detached Message {SHA384} ------------------ >cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 >smime.sh: #436: Create Detached Signature Alice (SHA384) . - PASSED >cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir >Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) >From: alice@bogus.com >Subject: message Alice --> Bob >To: bob@bogus.com >This is a test message from Alice to Bob. >smime.sh: #437: Verifying Alice's Detached Signature (SHA384) . - PASSED >smime.sh: Signing Attached Message (SHA384) ------------------ >cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 >smime.sh: #438: Create Attached Signature Alice (SHA384) . - PASSED >cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 >smime.sh: #439: Decode Alice's Attached Signature (SHA384) . - PASSED >diff alice.txt alice.data.SHA384 >smime.sh: #440: Compare Attached Signed Data and Original (SHA384) . - PASSED >smime.sh: Signing Detached Message {SHA512} ------------------ >cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 >smime.sh: #441: Create Detached Signature Alice (SHA512) . - PASSED >cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir >Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) >From: alice@bogus.com >Subject: message Alice --> Bob >To: bob@bogus.com >This is a test message from Alice to Bob. >smime.sh: #442: Verifying Alice's Detached Signature (SHA512) . - PASSED >smime.sh: Signing Attached Message (SHA512) ------------------ >cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 >smime.sh: #443: Create Attached Signature Alice (SHA512) . - PASSED >cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 >smime.sh: #444: Decode Alice's Attached Signature (SHA512) . - PASSED >diff alice.txt alice.data.SHA512 >smime.sh: #445: Compare Attached Signed Data and Original (SHA512) . - PASSED >smime.sh: Enveloped Data Tests ------------------------------ >cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ > -o alice.env >smime.sh: #446: Create Enveloped Data Alice . - PASSED >cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 >smime.sh: #447: Decode Enveloped Data Alice . - PASSED >diff alice.txt alice.data1 >smime.sh: #448: Compare Decoded Enveloped Data and Original . - PASSED >smime.sh: Testing multiple recipients ------------------------------ >cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ > -r bob@bogus.com,dave@bogus.com >smime.sh: #449: Create Multiple Recipients Enveloped Data Alice . - PASSED >smime.sh: Testing multiple email addrs ------------------------------ >cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ > -r eve@bogus.net >smime.sh: #450: Encrypt to a Multiple Email cert . - PASSED >cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 >smime.sh: #451: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED >cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 >smime.sh: #452: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED >cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 >smime.sh: #453: Decrypt with a Multiple Email cert . - PASSED >smime.sh: #454: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED >smime.sh: #455: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED >smime.sh: #456: Compare Decoded with Multiple Email cert . - PASSED >smime.sh: Sending CERTS-ONLY Message ------------------------------ >cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ > -d ../alicedir > co.der >smime.sh: #457: Create Certs-Only Alice . - PASSED >cmsutil -D -i co.der -d ../bobdir >smime.sh: #458: Verify Certs-Only by CA . - PASSED >smime.sh: Encrypted-Data Message --------------------------------- >cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ > -r "bob@bogus.com" > alice.enc >smime.sh: #459: Create Encrypted-Data . - PASSED >cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ > -o alice.data2 >smime.sh: #460: Decode Encrypted-Data . - PASSED >smime.sh: #461: Compare Decoded and Original Data . - PASSED >smime.sh: p7 util Data Tests ------------------------------ >p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env >smime.sh: #462: Creating envelope for user Alice . - PASSED >p7content -d ../alicedir -i alice.env -o alice_p7.data >smime.sh: #463: Verifying file delivered to user Alice . - PASSED >diff alice.txt alice_p7.data.sed >smime.sh: #464: Compare Decoded Enveloped Data and Original . - PASSED >p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e >smime.sh: #465: Signing file for user Alice . - PASSED >p7verify -d ../alicedir -c alice.txt -s alice.sig >Signature is valid. >smime.sh: #466: Verifying file delivered to user Alice . - PASSED >TIMESTAMP smime END: Wed Mar 6 17:12:29 MST 2013 >Running tests for ssl >TIMESTAMP ssl BEGIN: Wed Mar 6 17:12:29 MST 2013 >ssl.sh: SSL tests =============================== >ssl.sh: CRL SSL Client Tests =============================== >ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:29 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 30882 >/dev/null 2>/dev/null >selfserv_9218 with PID 30882 found at Wed Mar 6 17:12:29 MST 2013 >selfserv_9218 with PID 30882 started at Wed Mar 6 17:12:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #467: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 30882 at Wed Mar 6 17:12:29 MST 2013 >kill -USR1 30882 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 30882 killed at Wed Mar 6 17:12:29 MST 2013 >ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:29 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 30938 >/dev/null 2>/dev/null >selfserv_9218 with PID 30938 found at Wed Mar 6 17:12:29 MST 2013 >selfserv_9218 with PID 30938 started at Wed Mar 6 17:12:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #468: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 30938 at Wed Mar 6 17:12:29 MST 2013 >kill -USR1 30938 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 30938 killed at Wed Mar 6 17:12:29 MST 2013 >ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:29 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 30994 >/dev/null 2>/dev/null >selfserv_9218 with PID 30994 found at Wed Mar 6 17:12:29 MST 2013 >selfserv_9218 with PID 30994 started at Wed Mar 6 17:12:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #469: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 30994 at Wed Mar 6 17:12:30 MST 2013 >kill -USR1 30994 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 30994 killed at Wed Mar 6 17:12:30 MST 2013 >ssl.sh: TLS Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:30 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 31062 >/dev/null 2>/dev/null >selfserv_9218 with PID 31062 found at Wed Mar 6 17:12:30 MST 2013 >selfserv_9218 with PID 31062 started at Wed Mar 6 17:12:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #470: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 31062 at Wed Mar 6 17:12:30 MST 2013 >kill -USR1 31062 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 31062 killed at Wed Mar 6 17:12:30 MST 2013 >ssl.sh: TLS Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:30 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 31118 >/dev/null 2>/dev/null >selfserv_9218 with PID 31118 found at Wed Mar 6 17:12:30 MST 2013 >selfserv_9218 with PID 31118 started at Wed Mar 6 17:12:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #471: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 31118 at Wed Mar 6 17:12:30 MST 2013 >kill -USR1 31118 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 31118 killed at Wed Mar 6 17:12:30 MST 2013 >ssl.sh: TLS Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:30 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 31174 >/dev/null 2>/dev/null >selfserv_9218 with PID 31174 found at Wed Mar 6 17:12:30 MST 2013 >selfserv_9218 with PID 31174 started at Wed Mar 6 17:12:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #472: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 31174 at Wed Mar 6 17:12:30 MST 2013 >kill -USR1 31174 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 31174 killed at Wed Mar 6 17:12:30 MST 2013 >ssl.sh: TLS Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:30 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 31242 >/dev/null 2>/dev/null >selfserv_9218 with PID 31242 found at Wed Mar 6 17:12:30 MST 2013 >selfserv_9218 with PID 31242 started at Wed Mar 6 17:12:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #473: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 31242 at Wed Mar 6 17:12:30 MST 2013 >kill -USR1 31242 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 31242 killed at Wed Mar 6 17:12:30 MST 2013 >ssl.sh: TLS Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:30 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 31298 >/dev/null 2>/dev/null >selfserv_9218 with PID 31298 found at Wed Mar 6 17:12:30 MST 2013 >selfserv_9218 with PID 31298 started at Wed Mar 6 17:12:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #474: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 31298 at Wed Mar 6 17:12:30 MST 2013 >kill -USR1 31298 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 31298 killed at Wed Mar 6 17:12:30 MST 2013 >ssl.sh: TLS Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:30 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 31354 >/dev/null 2>/dev/null >selfserv_9218 with PID 31354 found at Wed Mar 6 17:12:30 MST 2013 >selfserv_9218 with PID 31354 started at Wed Mar 6 17:12:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #475: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 31354 at Wed Mar 6 17:12:30 MST 2013 >kill -USR1 31354 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 31354 killed at Wed Mar 6 17:12:30 MST 2013 >ssl.sh: TLS Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:30 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 31422 >/dev/null 2>/dev/null >selfserv_9218 with PID 31422 found at Wed Mar 6 17:12:30 MST 2013 >selfserv_9218 with PID 31422 started at Wed Mar 6 17:12:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #476: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 31422 at Wed Mar 6 17:12:31 MST 2013 >kill -USR1 31422 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 31422 killed at Wed Mar 6 17:12:31 MST 2013 >ssl.sh: TLS Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:31 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 31478 >/dev/null 2>/dev/null >selfserv_9218 with PID 31478 found at Wed Mar 6 17:12:31 MST 2013 >selfserv_9218 with PID 31478 started at Wed Mar 6 17:12:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #477: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 31478 at Wed Mar 6 17:12:31 MST 2013 >kill -USR1 31478 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 31478 killed at Wed Mar 6 17:12:31 MST 2013 >ssl.sh: TLS Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:31 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 31534 >/dev/null 2>/dev/null >selfserv_9218 with PID 31534 found at Wed Mar 6 17:12:31 MST 2013 >selfserv_9218 with PID 31534 started at Wed Mar 6 17:12:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #478: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 31534 at Wed Mar 6 17:12:31 MST 2013 >kill -USR1 31534 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 31534 killed at Wed Mar 6 17:12:31 MST 2013 >ssl.sh: TLS Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:31 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 31602 >/dev/null 2>/dev/null >selfserv_9218 with PID 31602 found at Wed Mar 6 17:12:31 MST 2013 >selfserv_9218 with PID 31602 started at Wed Mar 6 17:12:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #479: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 31602 at Wed Mar 6 17:12:31 MST 2013 >kill -USR1 31602 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 31602 killed at Wed Mar 6 17:12:31 MST 2013 >ssl.sh: TLS Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:31 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 31658 >/dev/null 2>/dev/null >selfserv_9218 with PID 31658 found at Wed Mar 6 17:12:31 MST 2013 >selfserv_9218 with PID 31658 started at Wed Mar 6 17:12:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #480: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 31658 at Wed Mar 6 17:12:31 MST 2013 >kill -USR1 31658 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 31658 killed at Wed Mar 6 17:12:31 MST 2013 >ssl.sh: TLS Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:31 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 31714 >/dev/null 2>/dev/null >selfserv_9218 with PID 31714 found at Wed Mar 6 17:12:31 MST 2013 >selfserv_9218 with PID 31714 started at Wed Mar 6 17:12:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #481: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 31714 at Wed Mar 6 17:12:31 MST 2013 >kill -USR1 31714 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 31714 killed at Wed Mar 6 17:12:31 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:31 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 31782 >/dev/null 2>/dev/null >selfserv_9218 with PID 31782 found at Wed Mar 6 17:12:31 MST 2013 >selfserv_9218 with PID 31782 started at Wed Mar 6 17:12:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #482: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 31782 at Wed Mar 6 17:12:31 MST 2013 >kill -USR1 31782 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 31782 killed at Wed Mar 6 17:12:31 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:31 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 31838 >/dev/null 2>/dev/null >selfserv_9218 with PID 31838 found at Wed Mar 6 17:12:31 MST 2013 >selfserv_9218 with PID 31838 started at Wed Mar 6 17:12:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #483: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 31838 at Wed Mar 6 17:12:32 MST 2013 >kill -USR1 31838 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 31838 killed at Wed Mar 6 17:12:32 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:32 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 31894 >/dev/null 2>/dev/null >selfserv_9218 with PID 31894 found at Wed Mar 6 17:12:32 MST 2013 >selfserv_9218 with PID 31894 started at Wed Mar 6 17:12:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #484: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 31894 at Wed Mar 6 17:12:32 MST 2013 >kill -USR1 31894 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 31894 killed at Wed Mar 6 17:12:32 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:32 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 31962 >/dev/null 2>/dev/null >selfserv_9218 with PID 31962 found at Wed Mar 6 17:12:32 MST 2013 >selfserv_9218 with PID 31962 started at Wed Mar 6 17:12:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #485: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 31962 at Wed Mar 6 17:12:32 MST 2013 >kill -USR1 31962 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 31962 killed at Wed Mar 6 17:12:32 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:32 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 32018 >/dev/null 2>/dev/null >selfserv_9218 with PID 32018 found at Wed Mar 6 17:12:32 MST 2013 >selfserv_9218 with PID 32018 started at Wed Mar 6 17:12:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #486: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 32018 at Wed Mar 6 17:12:32 MST 2013 >kill -USR1 32018 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 32018 killed at Wed Mar 6 17:12:32 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:32 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 32074 >/dev/null 2>/dev/null >selfserv_9218 with PID 32074 found at Wed Mar 6 17:12:32 MST 2013 >selfserv_9218 with PID 32074 started at Wed Mar 6 17:12:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #487: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 32074 at Wed Mar 6 17:12:32 MST 2013 >kill -USR1 32074 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 32074 killed at Wed Mar 6 17:12:32 MST 2013 >ssl.sh: SSL3 Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:32 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 32142 >/dev/null 2>/dev/null >selfserv_9218 with PID 32142 found at Wed Mar 6 17:12:32 MST 2013 >selfserv_9218 with PID 32142 started at Wed Mar 6 17:12:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #488: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 32142 at Wed Mar 6 17:12:32 MST 2013 >kill -USR1 32142 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 32142 killed at Wed Mar 6 17:12:32 MST 2013 >ssl.sh: SSL3 Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:32 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 32198 >/dev/null 2>/dev/null >selfserv_9218 with PID 32198 found at Wed Mar 6 17:12:32 MST 2013 >selfserv_9218 with PID 32198 started at Wed Mar 6 17:12:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #489: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 32198 at Wed Mar 6 17:12:32 MST 2013 >kill -USR1 32198 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 32198 killed at Wed Mar 6 17:12:32 MST 2013 >ssl.sh: SSL3 Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:32 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 32254 >/dev/null 2>/dev/null >selfserv_9218 with PID 32254 found at Wed Mar 6 17:12:33 MST 2013 >selfserv_9218 with PID 32254 started at Wed Mar 6 17:12:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #490: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 32254 at Wed Mar 6 17:12:33 MST 2013 >kill -USR1 32254 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 32254 killed at Wed Mar 6 17:12:33 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:33 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 32322 >/dev/null 2>/dev/null >selfserv_9218 with PID 32322 found at Wed Mar 6 17:12:33 MST 2013 >selfserv_9218 with PID 32322 started at Wed Mar 6 17:12:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #491: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 32322 at Wed Mar 6 17:12:33 MST 2013 >kill -USR1 32322 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 32322 killed at Wed Mar 6 17:12:33 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:33 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 32378 >/dev/null 2>/dev/null >selfserv_9218 with PID 32378 found at Wed Mar 6 17:12:33 MST 2013 >selfserv_9218 with PID 32378 started at Wed Mar 6 17:12:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #492: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 32378 at Wed Mar 6 17:12:33 MST 2013 >kill -USR1 32378 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 32378 killed at Wed Mar 6 17:12:33 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:33 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 32434 >/dev/null 2>/dev/null >selfserv_9218 with PID 32434 found at Wed Mar 6 17:12:33 MST 2013 >selfserv_9218 with PID 32434 started at Wed Mar 6 17:12:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #493: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 32434 at Wed Mar 6 17:12:33 MST 2013 >kill -USR1 32434 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 32434 killed at Wed Mar 6 17:12:33 MST 2013 >ssl.sh: SSL3 Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:33 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 32502 >/dev/null 2>/dev/null >selfserv_9218 with PID 32502 found at Wed Mar 6 17:12:33 MST 2013 >selfserv_9218 with PID 32502 started at Wed Mar 6 17:12:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #494: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 32502 at Wed Mar 6 17:12:33 MST 2013 >kill -USR1 32502 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 32502 killed at Wed Mar 6 17:12:33 MST 2013 >ssl.sh: SSL3 Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:33 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 32558 >/dev/null 2>/dev/null >selfserv_9218 with PID 32558 found at Wed Mar 6 17:12:33 MST 2013 >selfserv_9218 with PID 32558 started at Wed Mar 6 17:12:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #495: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 32558 at Wed Mar 6 17:12:33 MST 2013 >kill -USR1 32558 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 32558 killed at Wed Mar 6 17:12:33 MST 2013 >ssl.sh: SSL3 Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:33 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 32614 >/dev/null 2>/dev/null >selfserv_9218 with PID 32614 found at Wed Mar 6 17:12:33 MST 2013 >selfserv_9218 with PID 32614 started at Wed Mar 6 17:12:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #496: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 32614 at Wed Mar 6 17:12:33 MST 2013 >kill -USR1 32614 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 32614 killed at Wed Mar 6 17:12:34 MST 2013 >ssl.sh: SSL3 Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:34 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 32682 >/dev/null 2>/dev/null >selfserv_9218 with PID 32682 found at Wed Mar 6 17:12:34 MST 2013 >selfserv_9218 with PID 32682 started at Wed Mar 6 17:12:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #497: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 32682 at Wed Mar 6 17:12:34 MST 2013 >kill -USR1 32682 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 32682 killed at Wed Mar 6 17:12:34 MST 2013 >ssl.sh: SSL3 Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:34 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 32738 >/dev/null 2>/dev/null >selfserv_9218 with PID 32738 found at Wed Mar 6 17:12:34 MST 2013 >selfserv_9218 with PID 32738 started at Wed Mar 6 17:12:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #498: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 32738 at Wed Mar 6 17:12:34 MST 2013 >kill -USR1 32738 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 32738 killed at Wed Mar 6 17:12:34 MST 2013 >ssl.sh: SSL3 Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:34 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 32794 >/dev/null 2>/dev/null >selfserv_9218 with PID 32794 found at Wed Mar 6 17:12:34 MST 2013 >selfserv_9218 with PID 32794 started at Wed Mar 6 17:12:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #499: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 32794 at Wed Mar 6 17:12:34 MST 2013 >kill -USR1 32794 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 32794 killed at Wed Mar 6 17:12:34 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:34 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 32862 >/dev/null 2>/dev/null >selfserv_9218 with PID 32862 found at Wed Mar 6 17:12:34 MST 2013 >selfserv_9218 with PID 32862 started at Wed Mar 6 17:12:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #500: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 32862 at Wed Mar 6 17:12:34 MST 2013 >kill -USR1 32862 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 32862 killed at Wed Mar 6 17:12:34 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:34 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 32918 >/dev/null 2>/dev/null >selfserv_9218 with PID 32918 found at Wed Mar 6 17:12:34 MST 2013 >selfserv_9218 with PID 32918 started at Wed Mar 6 17:12:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #501: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 32918 at Wed Mar 6 17:12:34 MST 2013 >kill -USR1 32918 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 32918 killed at Wed Mar 6 17:12:34 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:34 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 32974 >/dev/null 2>/dev/null >selfserv_9218 with PID 32974 found at Wed Mar 6 17:12:34 MST 2013 >selfserv_9218 with PID 32974 started at Wed Mar 6 17:12:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #502: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 32974 at Wed Mar 6 17:12:34 MST 2013 >kill -USR1 32974 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 32974 killed at Wed Mar 6 17:12:34 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:34 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 33042 >/dev/null 2>/dev/null >selfserv_9218 with PID 33042 found at Wed Mar 6 17:12:34 MST 2013 >selfserv_9218 with PID 33042 started at Wed Mar 6 17:12:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #503: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 33042 at Wed Mar 6 17:12:35 MST 2013 >kill -USR1 33042 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 33042 killed at Wed Mar 6 17:12:35 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 33098 >/dev/null 2>/dev/null >selfserv_9218 with PID 33098 found at Wed Mar 6 17:12:35 MST 2013 >selfserv_9218 with PID 33098 started at Wed Mar 6 17:12:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #504: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 33098 at Wed Mar 6 17:12:35 MST 2013 >kill -USR1 33098 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 33098 killed at Wed Mar 6 17:12:35 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 33154 >/dev/null 2>/dev/null >selfserv_9218 with PID 33154 found at Wed Mar 6 17:12:35 MST 2013 >selfserv_9218 with PID 33154 started at Wed Mar 6 17:12:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #505: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 33154 at Wed Mar 6 17:12:35 MST 2013 >kill -USR1 33154 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 33154 killed at Wed Mar 6 17:12:35 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 33222 >/dev/null 2>/dev/null >selfserv_9218 with PID 33222 found at Wed Mar 6 17:12:35 MST 2013 >selfserv_9218 with PID 33222 started at Wed Mar 6 17:12:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #506: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 33222 at Wed Mar 6 17:12:35 MST 2013 >kill -USR1 33222 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 33222 killed at Wed Mar 6 17:12:35 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 33278 >/dev/null 2>/dev/null >selfserv_9218 with PID 33278 found at Wed Mar 6 17:12:35 MST 2013 >selfserv_9218 with PID 33278 started at Wed Mar 6 17:12:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #507: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 33278 at Wed Mar 6 17:12:35 MST 2013 >kill -USR1 33278 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 33278 killed at Wed Mar 6 17:12:35 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 33334 >/dev/null 2>/dev/null >selfserv_9218 with PID 33334 found at Wed Mar 6 17:12:35 MST 2013 >selfserv_9218 with PID 33334 started at Wed Mar 6 17:12:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #508: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 33334 at Wed Mar 6 17:12:35 MST 2013 >kill -USR1 33334 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 33334 killed at Wed Mar 6 17:12:35 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 33402 >/dev/null 2>/dev/null >selfserv_9218 with PID 33402 found at Wed Mar 6 17:12:35 MST 2013 >selfserv_9218 with PID 33402 started at Wed Mar 6 17:12:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #509: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 33402 at Wed Mar 6 17:12:35 MST 2013 >kill -USR1 33402 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 33402 killed at Wed Mar 6 17:12:35 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 33458 >/dev/null 2>/dev/null >selfserv_9218 with PID 33458 found at Wed Mar 6 17:12:35 MST 2013 >selfserv_9218 with PID 33458 started at Wed Mar 6 17:12:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #510: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 33458 at Wed Mar 6 17:12:36 MST 2013 >kill -USR1 33458 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 33458 killed at Wed Mar 6 17:12:36 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:36 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 33514 >/dev/null 2>/dev/null >selfserv_9218 with PID 33514 found at Wed Mar 6 17:12:36 MST 2013 >selfserv_9218 with PID 33514 started at Wed Mar 6 17:12:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #511: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 33514 at Wed Mar 6 17:12:36 MST 2013 >kill -USR1 33514 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 33514 killed at Wed Mar 6 17:12:36 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:36 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 33582 >/dev/null 2>/dev/null >selfserv_9218 with PID 33582 found at Wed Mar 6 17:12:36 MST 2013 >selfserv_9218 with PID 33582 started at Wed Mar 6 17:12:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #512: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 33582 at Wed Mar 6 17:12:36 MST 2013 >kill -USR1 33582 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 33582 killed at Wed Mar 6 17:12:36 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:36 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 33638 >/dev/null 2>/dev/null >selfserv_9218 with PID 33638 found at Wed Mar 6 17:12:36 MST 2013 >selfserv_9218 with PID 33638 started at Wed Mar 6 17:12:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #513: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 33638 at Wed Mar 6 17:12:36 MST 2013 >kill -USR1 33638 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 33638 killed at Wed Mar 6 17:12:36 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:36 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 33694 >/dev/null 2>/dev/null >selfserv_9218 with PID 33694 found at Wed Mar 6 17:12:36 MST 2013 >selfserv_9218 with PID 33694 started at Wed Mar 6 17:12:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #514: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 33694 at Wed Mar 6 17:12:36 MST 2013 >kill -USR1 33694 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 33694 killed at Wed Mar 6 17:12:36 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:36 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 33762 >/dev/null 2>/dev/null >selfserv_9218 with PID 33762 found at Wed Mar 6 17:12:36 MST 2013 >selfserv_9218 with PID 33762 started at Wed Mar 6 17:12:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #515: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 33762 at Wed Mar 6 17:12:36 MST 2013 >kill -USR1 33762 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 33762 killed at Wed Mar 6 17:12:36 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:36 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 33818 >/dev/null 2>/dev/null >selfserv_9218 with PID 33818 found at Wed Mar 6 17:12:36 MST 2013 >selfserv_9218 with PID 33818 started at Wed Mar 6 17:12:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #516: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 33818 at Wed Mar 6 17:12:36 MST 2013 >kill -USR1 33818 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 33818 killed at Wed Mar 6 17:12:36 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 33874 >/dev/null 2>/dev/null >selfserv_9218 with PID 33874 found at Wed Mar 6 17:12:37 MST 2013 >selfserv_9218 with PID 33874 started at Wed Mar 6 17:12:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #517: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 33874 at Wed Mar 6 17:12:37 MST 2013 >kill -USR1 33874 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 33874 killed at Wed Mar 6 17:12:37 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 33942 >/dev/null 2>/dev/null >selfserv_9218 with PID 33942 found at Wed Mar 6 17:12:37 MST 2013 >selfserv_9218 with PID 33942 started at Wed Mar 6 17:12:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #518: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 33942 at Wed Mar 6 17:12:37 MST 2013 >kill -USR1 33942 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 33942 killed at Wed Mar 6 17:12:37 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 33998 >/dev/null 2>/dev/null >selfserv_9218 with PID 33998 found at Wed Mar 6 17:12:37 MST 2013 >selfserv_9218 with PID 33998 started at Wed Mar 6 17:12:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #519: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 33998 at Wed Mar 6 17:12:37 MST 2013 >kill -USR1 33998 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 33998 killed at Wed Mar 6 17:12:37 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 34054 >/dev/null 2>/dev/null >selfserv_9218 with PID 34054 found at Wed Mar 6 17:12:37 MST 2013 >selfserv_9218 with PID 34054 started at Wed Mar 6 17:12:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #520: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 34054 at Wed Mar 6 17:12:37 MST 2013 >kill -USR1 34054 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 34054 killed at Wed Mar 6 17:12:37 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 34122 >/dev/null 2>/dev/null >selfserv_9218 with PID 34122 found at Wed Mar 6 17:12:37 MST 2013 >selfserv_9218 with PID 34122 started at Wed Mar 6 17:12:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #521: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 34122 at Wed Mar 6 17:12:37 MST 2013 >kill -USR1 34122 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 34122 killed at Wed Mar 6 17:12:37 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 34178 >/dev/null 2>/dev/null >selfserv_9218 with PID 34178 found at Wed Mar 6 17:12:37 MST 2013 >selfserv_9218 with PID 34178 started at Wed Mar 6 17:12:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #522: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 34178 at Wed Mar 6 17:12:37 MST 2013 >kill -USR1 34178 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 34178 killed at Wed Mar 6 17:12:37 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 34234 >/dev/null 2>/dev/null >selfserv_9218 with PID 34234 found at Wed Mar 6 17:12:37 MST 2013 >selfserv_9218 with PID 34234 started at Wed Mar 6 17:12:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #523: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 34234 at Wed Mar 6 17:12:38 MST 2013 >kill -USR1 34234 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 34234 killed at Wed Mar 6 17:12:38 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 34302 >/dev/null 2>/dev/null >selfserv_9218 with PID 34302 found at Wed Mar 6 17:12:38 MST 2013 >selfserv_9218 with PID 34302 started at Wed Mar 6 17:12:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #524: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 34302 at Wed Mar 6 17:12:38 MST 2013 >kill -USR1 34302 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 34302 killed at Wed Mar 6 17:12:38 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 34358 >/dev/null 2>/dev/null >selfserv_9218 with PID 34358 found at Wed Mar 6 17:12:38 MST 2013 >selfserv_9218 with PID 34358 started at Wed Mar 6 17:12:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #525: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 34358 at Wed Mar 6 17:12:38 MST 2013 >kill -USR1 34358 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 34358 killed at Wed Mar 6 17:12:38 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 34414 >/dev/null 2>/dev/null >selfserv_9218 with PID 34414 found at Wed Mar 6 17:12:38 MST 2013 >selfserv_9218 with PID 34414 started at Wed Mar 6 17:12:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #526: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 34414 at Wed Mar 6 17:12:38 MST 2013 >kill -USR1 34414 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 34414 killed at Wed Mar 6 17:12:38 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 34482 >/dev/null 2>/dev/null >selfserv_9218 with PID 34482 found at Wed Mar 6 17:12:38 MST 2013 >selfserv_9218 with PID 34482 started at Wed Mar 6 17:12:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #527: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 34482 at Wed Mar 6 17:12:38 MST 2013 >kill -USR1 34482 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 34482 killed at Wed Mar 6 17:12:38 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 34538 >/dev/null 2>/dev/null >selfserv_9218 with PID 34538 found at Wed Mar 6 17:12:38 MST 2013 >selfserv_9218 with PID 34538 started at Wed Mar 6 17:12:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #528: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 34538 at Wed Mar 6 17:12:38 MST 2013 >kill -USR1 34538 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 34538 killed at Wed Mar 6 17:12:38 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 34594 >/dev/null 2>/dev/null >selfserv_9218 with PID 34594 found at Wed Mar 6 17:12:38 MST 2013 >selfserv_9218 with PID 34594 started at Wed Mar 6 17:12:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #529: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 34594 at Wed Mar 6 17:12:38 MST 2013 >kill -USR1 34594 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 34594 killed at Wed Mar 6 17:12:38 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 34662 >/dev/null 2>/dev/null >selfserv_9218 with PID 34662 found at Wed Mar 6 17:12:39 MST 2013 >selfserv_9218 with PID 34662 started at Wed Mar 6 17:12:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #530: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 34662 at Wed Mar 6 17:12:39 MST 2013 >kill -USR1 34662 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 34662 killed at Wed Mar 6 17:12:39 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 34718 >/dev/null 2>/dev/null >selfserv_9218 with PID 34718 found at Wed Mar 6 17:12:39 MST 2013 >selfserv_9218 with PID 34718 started at Wed Mar 6 17:12:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #531: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 34718 at Wed Mar 6 17:12:39 MST 2013 >kill -USR1 34718 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 34718 killed at Wed Mar 6 17:12:39 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 34774 >/dev/null 2>/dev/null >selfserv_9218 with PID 34774 found at Wed Mar 6 17:12:39 MST 2013 >selfserv_9218 with PID 34774 started at Wed Mar 6 17:12:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #532: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 34774 at Wed Mar 6 17:12:39 MST 2013 >kill -USR1 34774 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 34774 killed at Wed Mar 6 17:12:39 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 34842 >/dev/null 2>/dev/null >selfserv_9218 with PID 34842 found at Wed Mar 6 17:12:39 MST 2013 >selfserv_9218 with PID 34842 started at Wed Mar 6 17:12:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #533: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 34842 at Wed Mar 6 17:12:39 MST 2013 >kill -USR1 34842 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 34842 killed at Wed Mar 6 17:12:39 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 34898 >/dev/null 2>/dev/null >selfserv_9218 with PID 34898 found at Wed Mar 6 17:12:39 MST 2013 >selfserv_9218 with PID 34898 started at Wed Mar 6 17:12:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #534: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 34898 at Wed Mar 6 17:12:39 MST 2013 >kill -USR1 34898 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 34898 killed at Wed Mar 6 17:12:39 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 34954 >/dev/null 2>/dev/null >selfserv_9218 with PID 34954 found at Wed Mar 6 17:12:39 MST 2013 >selfserv_9218 with PID 34954 started at Wed Mar 6 17:12:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #535: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 34954 at Wed Mar 6 17:12:39 MST 2013 >kill -USR1 34954 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 34954 killed at Wed Mar 6 17:12:39 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 35022 >/dev/null 2>/dev/null >selfserv_9218 with PID 35022 found at Wed Mar 6 17:12:39 MST 2013 >selfserv_9218 with PID 35022 started at Wed Mar 6 17:12:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #536: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 35022 at Wed Mar 6 17:12:40 MST 2013 >kill -USR1 35022 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 35022 killed at Wed Mar 6 17:12:40 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 35078 >/dev/null 2>/dev/null >selfserv_9218 with PID 35078 found at Wed Mar 6 17:12:40 MST 2013 >selfserv_9218 with PID 35078 started at Wed Mar 6 17:12:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #537: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 35078 at Wed Mar 6 17:12:40 MST 2013 >kill -USR1 35078 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 35078 killed at Wed Mar 6 17:12:40 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 35134 >/dev/null 2>/dev/null >selfserv_9218 with PID 35134 found at Wed Mar 6 17:12:40 MST 2013 >selfserv_9218 with PID 35134 started at Wed Mar 6 17:12:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #538: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 35134 at Wed Mar 6 17:12:40 MST 2013 >kill -USR1 35134 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 35134 killed at Wed Mar 6 17:12:40 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 35202 >/dev/null 2>/dev/null >selfserv_9218 with PID 35202 found at Wed Mar 6 17:12:40 MST 2013 >selfserv_9218 with PID 35202 started at Wed Mar 6 17:12:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #539: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 35202 at Wed Mar 6 17:12:40 MST 2013 >kill -USR1 35202 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 35202 killed at Wed Mar 6 17:12:40 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 35258 >/dev/null 2>/dev/null >selfserv_9218 with PID 35258 found at Wed Mar 6 17:12:40 MST 2013 >selfserv_9218 with PID 35258 started at Wed Mar 6 17:12:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #540: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 35258 at Wed Mar 6 17:12:40 MST 2013 >kill -USR1 35258 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 35258 killed at Wed Mar 6 17:12:40 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 35314 >/dev/null 2>/dev/null >selfserv_9218 with PID 35314 found at Wed Mar 6 17:12:40 MST 2013 >selfserv_9218 with PID 35314 started at Wed Mar 6 17:12:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #541: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 35314 at Wed Mar 6 17:12:40 MST 2013 >kill -USR1 35314 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 35314 killed at Wed Mar 6 17:12:40 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 35382 >/dev/null 2>/dev/null >selfserv_9218 with PID 35382 found at Wed Mar 6 17:12:40 MST 2013 >selfserv_9218 with PID 35382 started at Wed Mar 6 17:12:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #542: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 35382 at Wed Mar 6 17:12:40 MST 2013 >kill -USR1 35382 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 35382 killed at Wed Mar 6 17:12:40 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 35438 >/dev/null 2>/dev/null >selfserv_9218 with PID 35438 found at Wed Mar 6 17:12:40 MST 2013 >selfserv_9218 with PID 35438 started at Wed Mar 6 17:12:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #543: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 35438 at Wed Mar 6 17:12:41 MST 2013 >kill -USR1 35438 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 35438 killed at Wed Mar 6 17:12:41 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 35494 >/dev/null 2>/dev/null >selfserv_9218 with PID 35494 found at Wed Mar 6 17:12:41 MST 2013 >selfserv_9218 with PID 35494 started at Wed Mar 6 17:12:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #544: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 35494 at Wed Mar 6 17:12:41 MST 2013 >kill -USR1 35494 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 35494 killed at Wed Mar 6 17:12:41 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 35562 >/dev/null 2>/dev/null >selfserv_9218 with PID 35562 found at Wed Mar 6 17:12:41 MST 2013 >selfserv_9218 with PID 35562 started at Wed Mar 6 17:12:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #545: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 35562 at Wed Mar 6 17:12:41 MST 2013 >kill -USR1 35562 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 35562 killed at Wed Mar 6 17:12:41 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 35618 >/dev/null 2>/dev/null >selfserv_9218 with PID 35618 found at Wed Mar 6 17:12:41 MST 2013 >selfserv_9218 with PID 35618 started at Wed Mar 6 17:12:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #546: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 35618 at Wed Mar 6 17:12:41 MST 2013 >kill -USR1 35618 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 35618 killed at Wed Mar 6 17:12:41 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 35674 >/dev/null 2>/dev/null >selfserv_9218 with PID 35674 found at Wed Mar 6 17:12:41 MST 2013 >selfserv_9218 with PID 35674 started at Wed Mar 6 17:12:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #547: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 35674 at Wed Mar 6 17:12:41 MST 2013 >kill -USR1 35674 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 35674 killed at Wed Mar 6 17:12:41 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 35742 >/dev/null 2>/dev/null >selfserv_9218 with PID 35742 found at Wed Mar 6 17:12:41 MST 2013 >selfserv_9218 with PID 35742 started at Wed Mar 6 17:12:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #548: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 35742 at Wed Mar 6 17:12:41 MST 2013 >kill -USR1 35742 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 35742 killed at Wed Mar 6 17:12:41 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 35798 >/dev/null 2>/dev/null >selfserv_9218 with PID 35798 found at Wed Mar 6 17:12:41 MST 2013 >selfserv_9218 with PID 35798 started at Wed Mar 6 17:12:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #549: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 35798 at Wed Mar 6 17:12:41 MST 2013 >kill -USR1 35798 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 35798 killed at Wed Mar 6 17:12:41 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 35854 >/dev/null 2>/dev/null >selfserv_9218 with PID 35854 found at Wed Mar 6 17:12:42 MST 2013 >selfserv_9218 with PID 35854 started at Wed Mar 6 17:12:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #550: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 35854 at Wed Mar 6 17:12:42 MST 2013 >kill -USR1 35854 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 35854 killed at Wed Mar 6 17:12:42 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 35922 >/dev/null 2>/dev/null >selfserv_9218 with PID 35922 found at Wed Mar 6 17:12:42 MST 2013 >selfserv_9218 with PID 35922 started at Wed Mar 6 17:12:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #551: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 35922 at Wed Mar 6 17:12:42 MST 2013 >kill -USR1 35922 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 35922 killed at Wed Mar 6 17:12:42 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 35978 >/dev/null 2>/dev/null >selfserv_9218 with PID 35978 found at Wed Mar 6 17:12:42 MST 2013 >selfserv_9218 with PID 35978 started at Wed Mar 6 17:12:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #552: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 35978 at Wed Mar 6 17:12:42 MST 2013 >kill -USR1 35978 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 35978 killed at Wed Mar 6 17:12:42 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:12:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 36034 >/dev/null 2>/dev/null >selfserv_9218 with PID 36034 found at Wed Mar 6 17:12:42 MST 2013 >selfserv_9218 with PID 36034 started at Wed Mar 6 17:12:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #553: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 36034 at Wed Mar 6 17:12:42 MST 2013 >kill -USR1 36034 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 36034 killed at Wed Mar 6 17:12:42 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 36102 >/dev/null 2>/dev/null >selfserv_9218 with PID 36102 found at Wed Mar 6 17:12:42 MST 2013 >selfserv_9218 with PID 36102 started at Wed Mar 6 17:12:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #554: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 36102 at Wed Mar 6 17:12:42 MST 2013 >kill -USR1 36102 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 36102 killed at Wed Mar 6 17:12:42 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 36158 >/dev/null 2>/dev/null >selfserv_9218 with PID 36158 found at Wed Mar 6 17:12:42 MST 2013 >selfserv_9218 with PID 36158 started at Wed Mar 6 17:12:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #555: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 36158 at Wed Mar 6 17:12:42 MST 2013 >kill -USR1 36158 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 36158 killed at Wed Mar 6 17:12:42 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 36214 >/dev/null 2>/dev/null >selfserv_9218 with PID 36214 found at Wed Mar 6 17:12:42 MST 2013 >selfserv_9218 with PID 36214 started at Wed Mar 6 17:12:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #556: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 36214 at Wed Mar 6 17:12:43 MST 2013 >kill -USR1 36214 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 36214 killed at Wed Mar 6 17:12:43 MST 2013 >ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: Cache CRL SSL Client Tests =============================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/authin.tl.tmp >0 >selfserv_9218 starting at Wed Mar 6 17:12:43 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:43 MST 2013 >selfserv_9218 with PID 36286 started at Wed Mar 6 17:12:43 MST 2013 >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:43 MST 2013 >ssl.sh: #557: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:43 MST 2013 >ssl.sh: #558: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:43 MST 2013 >ssl.sh: #559: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:43 MST 2013 >ssl.sh: #560: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:43 MST 2013 >ssl.sh: #561: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:43 MST 2013 >ssl.sh: #562: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:43 MST 2013 >ssl.sh: #563: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:43 MST 2013 >ssl.sh: #564: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:43 MST 2013 >ssl.sh: #565: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:43 MST 2013 >ssl.sh: #566: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:43 MST 2013 >ssl.sh: #567: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:43 MST 2013 >ssl.sh: #568: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:43 MST 2013 >ssl.sh: #569: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 109 bytes >tstclnt: Writing 109 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:43 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #570: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:43 MST 2013 >ssl.sh: #571: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:43 MST 2013 >ssl.sh: #572: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:43 MST 2013 >ssl.sh: #573: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:44 MST 2013 >ssl.sh: #574: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:44 MST 2013 >ssl.sh: #575: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:44 MST 2013 >ssl.sh: #576: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:44 MST 2013 >ssl.sh: #577: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:44 MST 2013 >ssl.sh: #578: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:44 MST 2013 >ssl.sh: #579: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:44 MST 2013 >ssl.sh: #580: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:44 MST 2013 >ssl.sh: #581: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:44 MST 2013 >ssl.sh: #582: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:44 MST 2013 >ssl.sh: #583: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 109 bytes >tstclnt: Writing 109 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:44 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #584: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:44 MST 2013 >ssl.sh: #585: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:44 MST 2013 >ssl.sh: #586: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:44 MST 2013 >ssl.sh: #587: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:44 MST 2013 >ssl.sh: #588: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:44 MST 2013 >ssl.sh: #589: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:44 MST 2013 >ssl.sh: #590: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:44 MST 2013 >ssl.sh: #591: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:45 MST 2013 >ssl.sh: #592: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:45 MST 2013 >ssl.sh: #593: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:45 MST 2013 >ssl.sh: #594: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:45 MST 2013 >ssl.sh: #595: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:45 MST 2013 >ssl.sh: #596: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 36286 >/dev/null 2>/dev/null >selfserv_9218 with PID 36286 found at Wed Mar 6 17:12:45 MST 2013 >ssl.sh: #597: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 36286 at Wed Mar 6 17:12:45 MST 2013 >kill -USR1 36286 >selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 36286 killed at Wed Mar 6 17:12:45 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:45 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:45 MST 2013 >selfserv_9218 with PID 37708 started at Wed Mar 6 17:12:45 MST 2013 >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:45 MST 2013 >ssl.sh: #598: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:45 MST 2013 >ssl.sh: #599: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:45 MST 2013 >ssl.sh: #600: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:45 MST 2013 >ssl.sh: #601: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:45 MST 2013 >ssl.sh: #602: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:45 MST 2013 >ssl.sh: #603: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:45 MST 2013 >ssl.sh: #604: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:45 MST 2013 >ssl.sh: #605: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:45 MST 2013 >ssl.sh: #606: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:45 MST 2013 >ssl.sh: #607: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:45 MST 2013 >ssl.sh: #608: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:46 MST 2013 >ssl.sh: #609: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:46 MST 2013 >ssl.sh: #610: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 109 bytes >tstclnt: Writing 109 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:46 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #611: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:46 MST 2013 >ssl.sh: #612: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:46 MST 2013 >ssl.sh: #613: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:46 MST 2013 >ssl.sh: #614: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:46 MST 2013 >ssl.sh: #615: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:46 MST 2013 >ssl.sh: #616: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:46 MST 2013 >ssl.sh: #617: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:46 MST 2013 >ssl.sh: #618: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:46 MST 2013 >ssl.sh: #619: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:46 MST 2013 >ssl.sh: #620: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:46 MST 2013 >ssl.sh: #621: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:46 MST 2013 >ssl.sh: #622: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:46 MST 2013 >ssl.sh: #623: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:46 MST 2013 >ssl.sh: #624: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 109 bytes >tstclnt: Writing 109 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:46 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #625: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:46 MST 2013 >ssl.sh: #626: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:46 MST 2013 >ssl.sh: #627: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:47 MST 2013 >ssl.sh: #628: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:47 MST 2013 >ssl.sh: #629: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:47 MST 2013 >ssl.sh: #630: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:47 MST 2013 >ssl.sh: #631: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:47 MST 2013 >ssl.sh: #632: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:47 MST 2013 >ssl.sh: #633: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:47 MST 2013 >ssl.sh: #634: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:47 MST 2013 >ssl.sh: #635: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:47 MST 2013 >ssl.sh: #636: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:47 MST 2013 >ssl.sh: #637: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 37708 >/dev/null 2>/dev/null >selfserv_9218 with PID 37708 found at Wed Mar 6 17:12:47 MST 2013 >ssl.sh: #638: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 37708 at Wed Mar 6 17:12:47 MST 2013 >kill -USR1 37708 >selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 37708 killed at Wed Mar 6 17:12:47 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:47 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 39130 >/dev/null 2>/dev/null >selfserv_9218 with PID 39130 found at Wed Mar 6 17:12:47 MST 2013 >selfserv_9218 with PID 39130 started at Wed Mar 6 17:12:47 MST 2013 >ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) >trying to kill selfserv_9218 with PID 39130 at Wed Mar 6 17:12:47 MST 2013 >kill -USR1 39130 >./ssl.sh: line 173: 39130 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9218 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 39130 killed at Wed Mar 6 17:12:47 MST 2013 >selfserv_9218 starting at Wed Mar 6 17:12:47 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:47 MST 2013 >selfserv_9218 with PID 39172 started at Wed Mar 6 17:12:47 MST 2013 >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:47 MST 2013 >ssl.sh: #639: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:47 MST 2013 >ssl.sh: #640: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:47 MST 2013 >ssl.sh: #641: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:47 MST 2013 >ssl.sh: #642: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:47 MST 2013 >ssl.sh: #643: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:48 MST 2013 >ssl.sh: #644: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:48 MST 2013 >ssl.sh: #645: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:48 MST 2013 >ssl.sh: #646: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:48 MST 2013 >ssl.sh: #647: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:48 MST 2013 >ssl.sh: #648: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:48 MST 2013 >ssl.sh: #649: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:48 MST 2013 >ssl.sh: #650: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:48 MST 2013 >ssl.sh: #651: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 109 bytes >tstclnt: Writing 109 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:48 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #652: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:48 MST 2013 >ssl.sh: #653: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:48 MST 2013 >ssl.sh: #654: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:48 MST 2013 >ssl.sh: #655: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:48 MST 2013 >ssl.sh: #656: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:48 MST 2013 >ssl.sh: #657: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:48 MST 2013 >ssl.sh: #658: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:48 MST 2013 >ssl.sh: #659: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:48 MST 2013 >ssl.sh: #660: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:48 MST 2013 >ssl.sh: #661: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:49 MST 2013 >ssl.sh: #662: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:49 MST 2013 >ssl.sh: #663: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:49 MST 2013 >ssl.sh: #664: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:49 MST 2013 >ssl.sh: #665: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 109 bytes >tstclnt: Writing 109 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:49 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #666: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:49 MST 2013 >ssl.sh: #667: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:49 MST 2013 >ssl.sh: #668: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:49 MST 2013 >ssl.sh: #669: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:49 MST 2013 >ssl.sh: #670: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:49 MST 2013 >ssl.sh: #671: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:49 MST 2013 >ssl.sh: #672: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:49 MST 2013 >ssl.sh: #673: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:49 MST 2013 >ssl.sh: #674: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:49 MST 2013 >ssl.sh: #675: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:49 MST 2013 >ssl.sh: #676: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:49 MST 2013 >ssl.sh: #677: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:49 MST 2013 >ssl.sh: #678: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 39172 >/dev/null 2>/dev/null >selfserv_9218 with PID 39172 found at Wed Mar 6 17:12:50 MST 2013 >ssl.sh: #679: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 39172 at Wed Mar 6 17:12:50 MST 2013 >kill -USR1 39172 >selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 39172 killed at Wed Mar 6 17:12:50 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:50 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:50 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:50 MST 2013 >selfserv_9218 with PID 40594 started at Wed Mar 6 17:12:50 MST 2013 >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:50 MST 2013 >ssl.sh: #680: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:50 MST 2013 >ssl.sh: #681: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:50 MST 2013 >ssl.sh: #682: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:50 MST 2013 >ssl.sh: #683: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:50 MST 2013 >ssl.sh: #684: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:50 MST 2013 >ssl.sh: #685: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:50 MST 2013 >ssl.sh: #686: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:50 MST 2013 >ssl.sh: #687: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:50 MST 2013 >ssl.sh: #688: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:50 MST 2013 >ssl.sh: #689: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:50 MST 2013 >ssl.sh: #690: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:50 MST 2013 >ssl.sh: #691: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:50 MST 2013 >ssl.sh: #692: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 109 bytes >tstclnt: Writing 109 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:51 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #693: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:51 MST 2013 >ssl.sh: #694: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:51 MST 2013 >ssl.sh: #695: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:51 MST 2013 >ssl.sh: #696: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:51 MST 2013 >ssl.sh: #697: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:51 MST 2013 >ssl.sh: #698: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:51 MST 2013 >ssl.sh: #699: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:51 MST 2013 >ssl.sh: #700: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:51 MST 2013 >ssl.sh: #701: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:52 MST 2013 >ssl.sh: #702: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:52 MST 2013 >ssl.sh: #703: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:52 MST 2013 >ssl.sh: #704: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:52 MST 2013 >ssl.sh: #705: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:52 MST 2013 >ssl.sh: #706: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 109 bytes >tstclnt: Writing 109 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:52 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #707: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:52 MST 2013 >ssl.sh: #708: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:52 MST 2013 >ssl.sh: #709: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:52 MST 2013 >ssl.sh: #710: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:52 MST 2013 >ssl.sh: #711: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:52 MST 2013 >ssl.sh: #712: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:52 MST 2013 >ssl.sh: #713: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:52 MST 2013 >ssl.sh: #714: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:52 MST 2013 >ssl.sh: #715: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:52 MST 2013 >ssl.sh: #716: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:52 MST 2013 >ssl.sh: #717: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:52 MST 2013 >ssl.sh: #718: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:52 MST 2013 >ssl.sh: #719: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 40594 >/dev/null 2>/dev/null >selfserv_9218 with PID 40594 found at Wed Mar 6 17:12:53 MST 2013 >ssl.sh: #720: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 40594 at Wed Mar 6 17:12:53 MST 2013 >kill -USR1 40594 >selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 40594 killed at Wed Mar 6 17:12:53 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:53 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:53 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:53 MST 2013 >selfserv_9218 with PID 42016 started at Wed Mar 6 17:12:53 MST 2013 >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:53 MST 2013 >ssl.sh: #721: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:53 MST 2013 >ssl.sh: #722: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:53 MST 2013 >ssl.sh: #723: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:53 MST 2013 >ssl.sh: #724: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:53 MST 2013 >ssl.sh: #725: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:53 MST 2013 >ssl.sh: #726: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:53 MST 2013 >ssl.sh: #727: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:53 MST 2013 >ssl.sh: #728: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:53 MST 2013 >ssl.sh: #729: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:53 MST 2013 >ssl.sh: #730: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:53 MST 2013 >ssl.sh: #731: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:53 MST 2013 >ssl.sh: #732: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:53 MST 2013 >ssl.sh: #733: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 109 bytes >tstclnt: Writing 109 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:53 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #734: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:53 MST 2013 >ssl.sh: #735: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:54 MST 2013 >ssl.sh: #736: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:54 MST 2013 >ssl.sh: #737: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:54 MST 2013 >ssl.sh: #738: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:54 MST 2013 >ssl.sh: #739: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:54 MST 2013 >ssl.sh: #740: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:54 MST 2013 >ssl.sh: #741: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:54 MST 2013 >ssl.sh: #742: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:54 MST 2013 >ssl.sh: #743: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:54 MST 2013 >ssl.sh: #744: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:54 MST 2013 >ssl.sh: #745: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:54 MST 2013 >ssl.sh: #746: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:54 MST 2013 >ssl.sh: #747: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 109 bytes >tstclnt: Writing 109 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:54 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #748: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:54 MST 2013 >ssl.sh: #749: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:54 MST 2013 >ssl.sh: #750: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:54 MST 2013 >ssl.sh: #751: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:54 MST 2013 >ssl.sh: #752: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:54 MST 2013 >ssl.sh: #753: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:55 MST 2013 >ssl.sh: #754: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:55 MST 2013 >ssl.sh: #755: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:55 MST 2013 >ssl.sh: #756: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:55 MST 2013 >ssl.sh: #757: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:55 MST 2013 >ssl.sh: #758: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:55 MST 2013 >ssl.sh: #759: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:55 MST 2013 >ssl.sh: #760: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 42016 >/dev/null 2>/dev/null >selfserv_9218 with PID 42016 found at Wed Mar 6 17:12:55 MST 2013 >ssl.sh: #761: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 42016 at Wed Mar 6 17:12:55 MST 2013 >kill -USR1 42016 >selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 42016 killed at Wed Mar 6 17:12:55 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:55 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:55 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 43438 >/dev/null 2>/dev/null >selfserv_9218 with PID 43438 found at Wed Mar 6 17:12:55 MST 2013 >selfserv_9218 with PID 43438 started at Wed Mar 6 17:12:55 MST 2013 >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >trying to kill selfserv_9218 with PID 43438 at Wed Mar 6 17:12:55 MST 2013 >kill -USR1 43438 >./ssl.sh: line 173: 43438 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9218 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 43438 killed at Wed Mar 6 17:12:55 MST 2013 >selfserv_9218 starting at Wed Mar 6 17:12:55 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:55 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:55 MST 2013 >selfserv_9218 with PID 43480 started at Wed Mar 6 17:12:55 MST 2013 >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:55 MST 2013 >ssl.sh: #762: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:55 MST 2013 >ssl.sh: #763: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:55 MST 2013 >ssl.sh: #764: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:55 MST 2013 >ssl.sh: #765: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:55 MST 2013 >ssl.sh: #766: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:55 MST 2013 >ssl.sh: #767: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:55 MST 2013 >ssl.sh: #768: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:56 MST 2013 >ssl.sh: #769: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:56 MST 2013 >ssl.sh: #770: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:56 MST 2013 >ssl.sh: #771: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:56 MST 2013 >ssl.sh: #772: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:56 MST 2013 >ssl.sh: #773: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:56 MST 2013 >ssl.sh: #774: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 109 bytes >tstclnt: Writing 109 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:56 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #775: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:56 MST 2013 >ssl.sh: #776: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:56 MST 2013 >ssl.sh: #777: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:56 MST 2013 >ssl.sh: #778: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:56 MST 2013 >ssl.sh: #779: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:56 MST 2013 >ssl.sh: #780: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:56 MST 2013 >ssl.sh: #781: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:56 MST 2013 >ssl.sh: #782: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:56 MST 2013 >ssl.sh: #783: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:56 MST 2013 >ssl.sh: #784: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:56 MST 2013 >ssl.sh: #785: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:56 MST 2013 >ssl.sh: #786: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:57 MST 2013 >ssl.sh: #787: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:57 MST 2013 >ssl.sh: #788: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 109 bytes >tstclnt: Writing 109 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:57 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #789: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:57 MST 2013 >ssl.sh: #790: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:57 MST 2013 >ssl.sh: #791: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:57 MST 2013 >ssl.sh: #792: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:57 MST 2013 >ssl.sh: #793: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:57 MST 2013 >ssl.sh: #794: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:57 MST 2013 >ssl.sh: #795: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:57 MST 2013 >ssl.sh: #796: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:57 MST 2013 >ssl.sh: #797: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:57 MST 2013 >ssl.sh: #798: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:57 MST 2013 >ssl.sh: #799: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:57 MST 2013 >ssl.sh: #800: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:57 MST 2013 >ssl.sh: #801: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 43480 >/dev/null 2>/dev/null >selfserv_9218 with PID 43480 found at Wed Mar 6 17:12:57 MST 2013 >ssl.sh: #802: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 43480 at Wed Mar 6 17:12:57 MST 2013 >kill -USR1 43480 >selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 43480 killed at Wed Mar 6 17:12:57 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:12:57 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:12:57 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:57 MST 2013 >selfserv_9218 with PID 44902 started at Wed Mar 6 17:12:57 MST 2013 >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:58 MST 2013 >ssl.sh: #803: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:58 MST 2013 >ssl.sh: #804: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:58 MST 2013 >ssl.sh: #805: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:58 MST 2013 >ssl.sh: #806: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:58 MST 2013 >ssl.sh: #807: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:58 MST 2013 >ssl.sh: #808: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:58 MST 2013 >ssl.sh: #809: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:58 MST 2013 >ssl.sh: #810: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:58 MST 2013 >ssl.sh: #811: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:58 MST 2013 >ssl.sh: #812: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:58 MST 2013 >ssl.sh: #813: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:58 MST 2013 >ssl.sh: #814: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:58 MST 2013 >ssl.sh: #815: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 109 bytes >tstclnt: Writing 109 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:58 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #816: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:58 MST 2013 >ssl.sh: #817: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:58 MST 2013 >ssl.sh: #818: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:58 MST 2013 >ssl.sh: #819: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:58 MST 2013 >ssl.sh: #820: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:59 MST 2013 >ssl.sh: #821: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:59 MST 2013 >ssl.sh: #822: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:59 MST 2013 >ssl.sh: #823: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:59 MST 2013 >ssl.sh: #824: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:59 MST 2013 >ssl.sh: #825: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:59 MST 2013 >ssl.sh: #826: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:59 MST 2013 >ssl.sh: #827: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:59 MST 2013 >ssl.sh: #828: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:59 MST 2013 >ssl.sh: #829: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 109 bytes >tstclnt: Writing 109 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:59 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #830: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:59 MST 2013 >ssl.sh: #831: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:59 MST 2013 >ssl.sh: #832: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:59 MST 2013 >ssl.sh: #833: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:59 MST 2013 >ssl.sh: #834: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:59 MST 2013 >ssl.sh: #835: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:59 MST 2013 >ssl.sh: #836: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:59 MST 2013 >ssl.sh: #837: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:12:59 MST 2013 >ssl.sh: #838: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:13:00 MST 2013 >ssl.sh: #839: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:13:00 MST 2013 >ssl.sh: #840: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:13:00 MST 2013 >ssl.sh: #841: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:13:00 MST 2013 >ssl.sh: #842: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 44902 >/dev/null 2>/dev/null >selfserv_9218 with PID 44902 found at Wed Mar 6 17:13:00 MST 2013 >ssl.sh: #843: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 44902 at Wed Mar 6 17:13:00 MST 2013 >kill -USR1 44902 >selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 44902 killed at Wed Mar 6 17:13:00 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:00 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:00 MST 2013 >selfserv_9218 with PID 46324 started at Wed Mar 6 17:13:00 MST 2013 >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:00 MST 2013 >ssl.sh: #844: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:00 MST 2013 >ssl.sh: #845: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:00 MST 2013 >ssl.sh: #846: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:01 MST 2013 >ssl.sh: #847: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:01 MST 2013 >ssl.sh: #848: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:01 MST 2013 >ssl.sh: #849: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:01 MST 2013 >ssl.sh: #850: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:01 MST 2013 >ssl.sh: #851: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:01 MST 2013 >ssl.sh: #852: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:01 MST 2013 >ssl.sh: #853: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:01 MST 2013 >ssl.sh: #854: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:01 MST 2013 >ssl.sh: #855: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:01 MST 2013 >ssl.sh: #856: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 109 bytes >tstclnt: Writing 109 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:01 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #857: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:01 MST 2013 >ssl.sh: #858: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:01 MST 2013 >ssl.sh: #859: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:01 MST 2013 >ssl.sh: #860: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:01 MST 2013 >ssl.sh: #861: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:01 MST 2013 >ssl.sh: #862: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:01 MST 2013 >ssl.sh: #863: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:01 MST 2013 >ssl.sh: #864: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:02 MST 2013 >ssl.sh: #865: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:02 MST 2013 >ssl.sh: #866: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:02 MST 2013 >ssl.sh: #867: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:02 MST 2013 >ssl.sh: #868: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:02 MST 2013 >ssl.sh: #869: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:02 MST 2013 >ssl.sh: #870: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 109 bytes >tstclnt: Writing 109 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:02 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #871: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:02 MST 2013 >ssl.sh: #872: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:02 MST 2013 >ssl.sh: #873: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:02 MST 2013 >ssl.sh: #874: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:02 MST 2013 >ssl.sh: #875: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:02 MST 2013 >ssl.sh: #876: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:02 MST 2013 >ssl.sh: #877: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:02 MST 2013 >ssl.sh: #878: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:02 MST 2013 >ssl.sh: #879: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:02 MST 2013 >ssl.sh: #880: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:02 MST 2013 >ssl.sh: #881: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:02 MST 2013 >ssl.sh: #882: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:03 MST 2013 >ssl.sh: #883: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 46324 >/dev/null 2>/dev/null >selfserv_9218 with PID 46324 found at Wed Mar 6 17:13:03 MST 2013 >ssl.sh: #884: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 46324 at Wed Mar 6 17:13:03 MST 2013 >kill -USR1 46324 >selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 46324 killed at Wed Mar 6 17:13:03 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:03 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 47746 >/dev/null 2>/dev/null >selfserv_9218 with PID 47746 found at Wed Mar 6 17:13:03 MST 2013 >selfserv_9218 with PID 47746 started at Wed Mar 6 17:13:03 MST 2013 >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) >trying to kill selfserv_9218 with PID 47746 at Wed Mar 6 17:13:03 MST 2013 >kill -USR1 47746 >./ssl.sh: line 173: 47746 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9218 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 47746 killed at Wed Mar 6 17:13:03 MST 2013 >ssl.sh: SSL Cipher Coverage - server bypass/client normal =============================== >selfserv_9218 starting at Wed Mar 6 17:13:03 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:03 MST 2013 >selfserv_9218 with PID 47794 started at Wed Mar 6 17:13:03 MST 2013 >ssl.sh: running SSL2_RC4_128_WITH_MD5 ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c A -V ssl2:ssl3 -O \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #885: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c B -V ssl2:tls1.0 -O \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #886: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c C -V ssl2:tls1.0 -O \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #887: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c D -V ssl2:ssl3 -O \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #888: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c E -V ssl2:tls1.0 -O \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #889: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c F -V ssl2:ssl3 -O \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #890: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c B -V ssl2:tls1.1 -O \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #891: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c C -V ssl2:tls1.1 -O \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #892: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c E -V ssl2:tls1.1 -O \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #893: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #894: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #895: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #896: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c f -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #897: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c g -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #898: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #899: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #900: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #901: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c l -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #902: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c m -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #903: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #904: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #905: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #906: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #907: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #908: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #909: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #910: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c f -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #911: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c g -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #912: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #913: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #914: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #915: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c l -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #916: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c m -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #917: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #918: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #919: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #920: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #921: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #922: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #923: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #924: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #925: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #926: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #927: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c l -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #928: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c m -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #929: TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #930: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #931: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #932: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- >kill -0 47794 >/dev/null 2>/dev/null >selfserv_9218 with PID 47794 found at Wed Mar 6 17:13:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #933: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >trying to kill selfserv_9218 with PID 47794 at Wed Mar 6 17:13:05 MST 2013 >kill -USR1 47794 >selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 47794 killed at Wed Mar 6 17:13:05 MST 2013 >ssl.sh: SSL Client Authentication - server bypass/client normal =============================== >ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:06 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 49473 >/dev/null 2>/dev/null >selfserv_9218 with PID 49473 found at Wed Mar 6 17:13:06 MST 2013 >selfserv_9218 with PID 49473 started at Wed Mar 6 17:13:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #934: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 49473 at Wed Mar 6 17:13:06 MST 2013 >kill -USR1 49473 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 49473 killed at Wed Mar 6 17:13:06 MST 2013 >ssl.sh: TLS Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:06 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 49530 >/dev/null 2>/dev/null >selfserv_9218 with PID 49530 found at Wed Mar 6 17:13:06 MST 2013 >selfserv_9218 with PID 49530 started at Wed Mar 6 17:13:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #935: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 49530 at Wed Mar 6 17:13:06 MST 2013 >kill -USR1 49530 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 49530 killed at Wed Mar 6 17:13:06 MST 2013 >ssl.sh: TLS Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:06 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 49587 >/dev/null 2>/dev/null >selfserv_9218 with PID 49587 found at Wed Mar 6 17:13:06 MST 2013 >selfserv_9218 with PID 49587 started at Wed Mar 6 17:13:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #936: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 49587 at Wed Mar 6 17:13:06 MST 2013 >kill -USR1 49587 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 49587 killed at Wed Mar 6 17:13:06 MST 2013 >ssl.sh: TLS Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:06 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 49644 >/dev/null 2>/dev/null >selfserv_9218 with PID 49644 found at Wed Mar 6 17:13:06 MST 2013 >selfserv_9218 with PID 49644 started at Wed Mar 6 17:13:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #937: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 49644 at Wed Mar 6 17:13:06 MST 2013 >kill -USR1 49644 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 49644 killed at Wed Mar 6 17:13:06 MST 2013 >ssl.sh: TLS Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:06 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 49701 >/dev/null 2>/dev/null >selfserv_9218 with PID 49701 found at Wed Mar 6 17:13:06 MST 2013 >selfserv_9218 with PID 49701 started at Wed Mar 6 17:13:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #938: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 49701 at Wed Mar 6 17:13:06 MST 2013 >kill -USR1 49701 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 49701 killed at Wed Mar 6 17:13:06 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:06 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 49758 >/dev/null 2>/dev/null >selfserv_9218 with PID 49758 found at Wed Mar 6 17:13:06 MST 2013 >selfserv_9218 with PID 49758 started at Wed Mar 6 17:13:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #939: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 49758 at Wed Mar 6 17:13:06 MST 2013 >kill -USR1 49758 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 49758 killed at Wed Mar 6 17:13:06 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:06 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 49815 >/dev/null 2>/dev/null >selfserv_9218 with PID 49815 found at Wed Mar 6 17:13:06 MST 2013 >selfserv_9218 with PID 49815 started at Wed Mar 6 17:13:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #940: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 49815 at Wed Mar 6 17:13:07 MST 2013 >kill -USR1 49815 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 49815 killed at Wed Mar 6 17:13:07 MST 2013 >ssl.sh: SSL3 Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:07 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 49872 >/dev/null 2>/dev/null >selfserv_9218 with PID 49872 found at Wed Mar 6 17:13:07 MST 2013 >selfserv_9218 with PID 49872 started at Wed Mar 6 17:13:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #941: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 49872 at Wed Mar 6 17:13:07 MST 2013 >kill -USR1 49872 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 49872 killed at Wed Mar 6 17:13:07 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:07 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 49929 >/dev/null 2>/dev/null >selfserv_9218 with PID 49929 found at Wed Mar 6 17:13:07 MST 2013 >selfserv_9218 with PID 49929 started at Wed Mar 6 17:13:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #942: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 49929 at Wed Mar 6 17:13:07 MST 2013 >kill -USR1 49929 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 49929 killed at Wed Mar 6 17:13:07 MST 2013 >ssl.sh: SSL3 Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:07 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 49986 >/dev/null 2>/dev/null >selfserv_9218 with PID 49986 found at Wed Mar 6 17:13:07 MST 2013 >selfserv_9218 with PID 49986 started at Wed Mar 6 17:13:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #943: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 49986 at Wed Mar 6 17:13:07 MST 2013 >kill -USR1 49986 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 49986 killed at Wed Mar 6 17:13:07 MST 2013 >ssl.sh: SSL3 Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:07 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 50043 >/dev/null 2>/dev/null >selfserv_9218 with PID 50043 found at Wed Mar 6 17:13:07 MST 2013 >selfserv_9218 with PID 50043 started at Wed Mar 6 17:13:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #944: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 50043 at Wed Mar 6 17:13:07 MST 2013 >kill -USR1 50043 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 50043 killed at Wed Mar 6 17:13:07 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:07 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 50100 >/dev/null 2>/dev/null >selfserv_9218 with PID 50100 found at Wed Mar 6 17:13:07 MST 2013 >selfserv_9218 with PID 50100 started at Wed Mar 6 17:13:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #945: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 50100 at Wed Mar 6 17:13:07 MST 2013 >kill -USR1 50100 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 50100 killed at Wed Mar 6 17:13:07 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:07 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 50157 >/dev/null 2>/dev/null >selfserv_9218 with PID 50157 found at Wed Mar 6 17:13:07 MST 2013 >selfserv_9218 with PID 50157 started at Wed Mar 6 17:13:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #946: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 50157 at Wed Mar 6 17:13:07 MST 2013 >kill -USR1 50157 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 50157 killed at Wed Mar 6 17:13:07 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:07 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 50214 >/dev/null 2>/dev/null >selfserv_9218 with PID 50214 found at Wed Mar 6 17:13:07 MST 2013 >selfserv_9218 with PID 50214 started at Wed Mar 6 17:13:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #947: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 50214 at Wed Mar 6 17:13:08 MST 2013 >kill -USR1 50214 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 50214 killed at Wed Mar 6 17:13:08 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 50271 >/dev/null 2>/dev/null >selfserv_9218 with PID 50271 found at Wed Mar 6 17:13:08 MST 2013 >selfserv_9218 with PID 50271 started at Wed Mar 6 17:13:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #948: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 50271 at Wed Mar 6 17:13:08 MST 2013 >kill -USR1 50271 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 50271 killed at Wed Mar 6 17:13:08 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 50328 >/dev/null 2>/dev/null >selfserv_9218 with PID 50328 found at Wed Mar 6 17:13:08 MST 2013 >selfserv_9218 with PID 50328 started at Wed Mar 6 17:13:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #949: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 50328 at Wed Mar 6 17:13:08 MST 2013 >kill -USR1 50328 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 50328 killed at Wed Mar 6 17:13:08 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 50385 >/dev/null 2>/dev/null >selfserv_9218 with PID 50385 found at Wed Mar 6 17:13:08 MST 2013 >selfserv_9218 with PID 50385 started at Wed Mar 6 17:13:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #950: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 50385 at Wed Mar 6 17:13:08 MST 2013 >kill -USR1 50385 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 50385 killed at Wed Mar 6 17:13:08 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 50442 >/dev/null 2>/dev/null >selfserv_9218 with PID 50442 found at Wed Mar 6 17:13:08 MST 2013 >selfserv_9218 with PID 50442 started at Wed Mar 6 17:13:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #951: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 50442 at Wed Mar 6 17:13:08 MST 2013 >kill -USR1 50442 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 50442 killed at Wed Mar 6 17:13:08 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 50501 >/dev/null 2>/dev/null >selfserv_9218 with PID 50501 found at Wed Mar 6 17:13:08 MST 2013 >selfserv_9218 with PID 50501 started at Wed Mar 6 17:13:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #952: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 50501 at Wed Mar 6 17:13:08 MST 2013 >kill -USR1 50501 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 50501 killed at Wed Mar 6 17:13:08 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 50558 >/dev/null 2>/dev/null >selfserv_9218 with PID 50558 found at Wed Mar 6 17:13:08 MST 2013 >selfserv_9218 with PID 50558 started at Wed Mar 6 17:13:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #953: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 50558 at Wed Mar 6 17:13:08 MST 2013 >kill -USR1 50558 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 50558 killed at Wed Mar 6 17:13:08 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 50615 >/dev/null 2>/dev/null >selfserv_9218 with PID 50615 found at Wed Mar 6 17:13:09 MST 2013 >selfserv_9218 with PID 50615 started at Wed Mar 6 17:13:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #954: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 50615 at Wed Mar 6 17:13:09 MST 2013 >kill -USR1 50615 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 50615 killed at Wed Mar 6 17:13:09 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:09 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 50672 >/dev/null 2>/dev/null >selfserv_9218 with PID 50672 found at Wed Mar 6 17:13:09 MST 2013 >selfserv_9218 with PID 50672 started at Wed Mar 6 17:13:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #955: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 50672 at Wed Mar 6 17:13:09 MST 2013 >kill -USR1 50672 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 50672 killed at Wed Mar 6 17:13:09 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:09 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 50729 >/dev/null 2>/dev/null >selfserv_9218 with PID 50729 found at Wed Mar 6 17:13:09 MST 2013 >selfserv_9218 with PID 50729 started at Wed Mar 6 17:13:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #956: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 50729 at Wed Mar 6 17:13:09 MST 2013 >kill -USR1 50729 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 50729 killed at Wed Mar 6 17:13:09 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:09 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 50786 >/dev/null 2>/dev/null >selfserv_9218 with PID 50786 found at Wed Mar 6 17:13:09 MST 2013 >selfserv_9218 with PID 50786 started at Wed Mar 6 17:13:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #957: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 50786 at Wed Mar 6 17:13:09 MST 2013 >kill -USR1 50786 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 50786 killed at Wed Mar 6 17:13:09 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:09 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 50843 >/dev/null 2>/dev/null >selfserv_9218 with PID 50843 found at Wed Mar 6 17:13:09 MST 2013 >selfserv_9218 with PID 50843 started at Wed Mar 6 17:13:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #958: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 50843 at Wed Mar 6 17:13:09 MST 2013 >kill -USR1 50843 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 50843 killed at Wed Mar 6 17:13:09 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:09 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 50900 >/dev/null 2>/dev/null >selfserv_9218 with PID 50900 found at Wed Mar 6 17:13:09 MST 2013 >selfserv_9218 with PID 50900 started at Wed Mar 6 17:13:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #959: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 50900 at Wed Mar 6 17:13:09 MST 2013 >kill -USR1 50900 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 50900 killed at Wed Mar 6 17:13:09 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:09 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 50957 >/dev/null 2>/dev/null >selfserv_9218 with PID 50957 found at Wed Mar 6 17:13:09 MST 2013 >selfserv_9218 with PID 50957 started at Wed Mar 6 17:13:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #960: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 50957 at Wed Mar 6 17:13:10 MST 2013 >kill -USR1 50957 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 50957 killed at Wed Mar 6 17:13:10 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 51014 >/dev/null 2>/dev/null >selfserv_9218 with PID 51014 found at Wed Mar 6 17:13:10 MST 2013 >selfserv_9218 with PID 51014 started at Wed Mar 6 17:13:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #961: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 51014 at Wed Mar 6 17:13:10 MST 2013 >kill -USR1 51014 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 51014 killed at Wed Mar 6 17:13:10 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 51071 >/dev/null 2>/dev/null >selfserv_9218 with PID 51071 found at Wed Mar 6 17:13:10 MST 2013 >selfserv_9218 with PID 51071 started at Wed Mar 6 17:13:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #962: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 51071 at Wed Mar 6 17:13:10 MST 2013 >kill -USR1 51071 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 51071 killed at Wed Mar 6 17:13:10 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 51128 >/dev/null 2>/dev/null >selfserv_9218 with PID 51128 found at Wed Mar 6 17:13:10 MST 2013 >selfserv_9218 with PID 51128 started at Wed Mar 6 17:13:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #963: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 51128 at Wed Mar 6 17:13:10 MST 2013 >kill -USR1 51128 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 51128 killed at Wed Mar 6 17:13:10 MST 2013 >ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: TLS Server hello response without SNI ---- >selfserv_9218 starting at Wed Mar 6 17:13:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 51261 >/dev/null 2>/dev/null >selfserv_9218 with PID 51261 found at Wed Mar 6 17:13:10 MST 2013 >selfserv_9218 with PID 51261 started at Wed Mar 6 17:13:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #964: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 51261 at Wed Mar 6 17:13:10 MST 2013 >kill -USR1 51261 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 51261 killed at Wed Mar 6 17:13:10 MST 2013 >ssl.sh: TLS Server hello response with SNI ---- >selfserv_9218 starting at Wed Mar 6 17:13:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 51324 >/dev/null 2>/dev/null >selfserv_9218 with PID 51324 found at Wed Mar 6 17:13:10 MST 2013 >selfserv_9218 with PID 51324 started at Wed Mar 6 17:13:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #965: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 51324 at Wed Mar 6 17:13:10 MST 2013 >kill -USR1 51324 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 51324 killed at Wed Mar 6 17:13:10 MST 2013 >ssl.sh: TLS Server response with alert ---- >selfserv_9218 starting at Wed Mar 6 17:13:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 51387 >/dev/null 2>/dev/null >selfserv_9218 with PID 51387 found at Wed Mar 6 17:13:10 MST 2013 >selfserv_9218 with PID 51387 started at Wed Mar 6 17:13:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. >tstclnt: exiting with return code 254 >ssl.sh: #966: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 51387 at Wed Mar 6 17:13:11 MST 2013 >kill -USR1 51387 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 51387 killed at Wed Mar 6 17:13:11 MST 2013 >ssl.sh: SSL3 Server hello response without SNI ---- >selfserv_9218 starting at Wed Mar 6 17:13:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 51450 >/dev/null 2>/dev/null >selfserv_9218 with PID 51450 found at Wed Mar 6 17:13:11 MST 2013 >selfserv_9218 with PID 51450 started at Wed Mar 6 17:13:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #967: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 51450 at Wed Mar 6 17:13:11 MST 2013 >kill -USR1 51450 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 51450 killed at Wed Mar 6 17:13:11 MST 2013 >ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- >selfserv_9218 starting at Wed Mar 6 17:13:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 51513 >/dev/null 2>/dev/null >selfserv_9218 with PID 51513 found at Wed Mar 6 17:13:11 MST 2013 >selfserv_9218 with PID 51513 started at Wed Mar 6 17:13:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12271: >SSL peer cannot verify your certificate. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. >tstclnt: exiting with return code 254 >ssl.sh: #968: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 51513 at Wed Mar 6 17:13:11 MST 2013 >kill -USR1 51513 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 51513 killed at Wed Mar 6 17:13:11 MST 2013 >ssl.sh: TLS Server hello response without SNI ---- >selfserv_9218 starting at Wed Mar 6 17:13:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 51576 >/dev/null 2>/dev/null >selfserv_9218 with PID 51576 found at Wed Mar 6 17:13:11 MST 2013 >selfserv_9218 with PID 51576 started at Wed Mar 6 17:13:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #969: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 51576 at Wed Mar 6 17:13:11 MST 2013 >kill -USR1 51576 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 51576 killed at Wed Mar 6 17:13:11 MST 2013 >ssl.sh: TLS Server hello response with SNI ---- >selfserv_9218 starting at Wed Mar 6 17:13:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 51639 >/dev/null 2>/dev/null >selfserv_9218 with PID 51639 found at Wed Mar 6 17:13:11 MST 2013 >selfserv_9218 with PID 51639 started at Wed Mar 6 17:13:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #970: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 51639 at Wed Mar 6 17:13:11 MST 2013 >kill -USR1 51639 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 51639 killed at Wed Mar 6 17:13:11 MST 2013 >ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- >selfserv_9218 starting at Wed Mar 6 17:13:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 51702 >/dev/null 2>/dev/null >selfserv_9218 with PID 51702 found at Wed Mar 6 17:13:11 MST 2013 >selfserv_9218 with PID 51702 started at Wed Mar 6 17:13:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). >tstclnt: exiting with return code 1 >ssl.sh: #971: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 51702 at Wed Mar 6 17:13:11 MST 2013 >kill -USR1 51702 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 51702 killed at Wed Mar 6 17:13:11 MST 2013 >ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- >selfserv_9218 starting at Wed Mar 6 17:13:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 51765 >/dev/null 2>/dev/null >selfserv_9218 with PID 51765 found at Wed Mar 6 17:13:11 MST 2013 >selfserv_9218 with PID 51765 started at Wed Mar 6 17:13:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. >tstclnt: exiting with return code 1 >ssl.sh: #972: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 51765 at Wed Mar 6 17:13:11 MST 2013 >kill -USR1 51765 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 51765 killed at Wed Mar 6 17:13:12 MST 2013 >ssl.sh: TLS Server response with alert ---- >selfserv_9218 starting at Wed Mar 6 17:13:12 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 51828 >/dev/null 2>/dev/null >selfserv_9218 with PID 51828 found at Wed Mar 6 17:13:12 MST 2013 >selfserv_9218 with PID 51828 started at Wed Mar 6 17:13:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. >tstclnt: exiting with return code 254 >ssl.sh: #973: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 51828 at Wed Mar 6 17:13:12 MST 2013 >kill -USR1 51828 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 51828 killed at Wed Mar 6 17:13:12 MST 2013 >ssl.sh: SSL Stress Test - server bypass/client normal =============================== >ssl.sh: Stress SSL2 RC4 128 with MD5 ---- >selfserv_9218 starting at Wed Mar 6 17:13:12 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 51960 >/dev/null 2>/dev/null >selfserv_9218 with PID 51960 found at Wed Mar 6 17:13:12 MST 2013 >selfserv_9218 with PID 51960 started at Wed Mar 6 17:13:12 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -c 1000 -C A \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:12 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: SSL2 - 1 server certificates tested. >strsclnt completed at Wed Mar 6 17:13:12 MST 2013 >ssl.sh: #974: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 51960 at Wed Mar 6 17:13:12 MST 2013 >kill -USR1 51960 >selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 51960 killed at Wed Mar 6 17:13:12 MST 2013 >ssl.sh: Stress SSL3 RC4 128 with MD5 ---- >selfserv_9218 starting at Wed Mar 6 17:13:12 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 52036 >/dev/null 2>/dev/null >selfserv_9218 with PID 52036 found at Wed Mar 6 17:13:12 MST 2013 >selfserv_9218 with PID 52036 started at Wed Mar 6 17:13:12 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -c 1000 -C c -V :ssl3 \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:12 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:13:12 MST 2013 >ssl.sh: #975: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 52036 at Wed Mar 6 17:13:12 MST 2013 >kill -USR1 52036 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 52036 killed at Wed Mar 6 17:13:12 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 ---- >selfserv_9218 starting at Wed Mar 6 17:13:12 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 52112 >/dev/null 2>/dev/null >selfserv_9218 with PID 52112 found at Wed Mar 6 17:13:12 MST 2013 >selfserv_9218 with PID 52112 started at Wed Mar 6 17:13:12 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -c 1000 -C c \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:12 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:13:13 MST 2013 >ssl.sh: #976: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 52112 at Wed Mar 6 17:13:13 MST 2013 >kill -USR1 52112 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 52112 killed at Wed Mar 6 17:13:13 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- >selfserv_9218 starting at Wed Mar 6 17:13:13 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 52188 >/dev/null 2>/dev/null >selfserv_9218 with PID 52188 found at Wed Mar 6 17:13:13 MST 2013 >selfserv_9218 with PID 52188 started at Wed Mar 6 17:13:13 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -c 1000 -C c -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:13 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:13:13 MST 2013 >ssl.sh: #977: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 52188 at Wed Mar 6 17:13:13 MST 2013 >kill -USR1 52188 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 52188 killed at Wed Mar 6 17:13:13 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- >selfserv_9218 starting at Wed Mar 6 17:13:13 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -u -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 52264 >/dev/null 2>/dev/null >selfserv_9218 with PID 52264 found at Wed Mar 6 17:13:13 MST 2013 >selfserv_9218 with PID 52264 started at Wed Mar 6 17:13:13 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 1000 -C c -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:13 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:13:13 MST 2013 >ssl.sh: #978: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 52264 at Wed Mar 6 17:13:13 MST 2013 >kill -USR1 52264 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 52264 killed at Wed Mar 6 17:13:13 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- >selfserv_9218 starting at Wed Mar 6 17:13:13 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 52340 >/dev/null 2>/dev/null >selfserv_9218 with PID 52340 found at Wed Mar 6 17:13:13 MST 2013 >selfserv_9218 with PID 52340 started at Wed Mar 6 17:13:13 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 1000 -C c -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:13 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:13:14 MST 2013 >ssl.sh: #979: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 52340 at Wed Mar 6 17:13:14 MST 2013 >kill -USR1 52340 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 52340 killed at Wed Mar 6 17:13:14 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- >selfserv_9218 starting at Wed Mar 6 17:13:14 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 52416 >/dev/null 2>/dev/null >selfserv_9218 with PID 52416 found at Wed Mar 6 17:13:14 MST 2013 >selfserv_9218 with PID 52416 started at Wed Mar 6 17:13:14 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:14 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:13:14 MST 2013 >ssl.sh: #980: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 52416 at Wed Mar 6 17:13:14 MST 2013 >kill -USR1 52416 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 52416 killed at Wed Mar 6 17:13:14 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:13:14 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 52492 >/dev/null 2>/dev/null >selfserv_9218 with PID 52492 found at Wed Mar 6 17:13:14 MST 2013 >selfserv_9218 with PID 52492 started at Wed Mar 6 17:13:14 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:14 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:13:14 MST 2013 >ssl.sh: #981: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 52492 at Wed Mar 6 17:13:14 MST 2013 >kill -USR1 52492 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 52492 killed at Wed Mar 6 17:13:14 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- >selfserv_9218 starting at Wed Mar 6 17:13:14 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -u -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 52574 >/dev/null 2>/dev/null >selfserv_9218 with PID 52574 found at Wed Mar 6 17:13:14 MST 2013 >selfserv_9218 with PID 52574 started at Wed Mar 6 17:13:14 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:14 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:13:15 MST 2013 >ssl.sh: #982: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 52574 at Wed Mar 6 17:13:15 MST 2013 >kill -USR1 52574 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 52574 killed at Wed Mar 6 17:13:15 MST 2013 >ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:15 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 52671 >/dev/null 2>/dev/null >selfserv_9218 with PID 52671 found at Wed Mar 6 17:13:15 MST 2013 >selfserv_9218 with PID 52671 started at Wed Mar 6 17:13:15 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -c 100 -C A -N -n TestUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:15 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: SSL2 - 100 server certificates tested. >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:13:15 MST 2013 >ssl.sh: #983: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 52671 at Wed Mar 6 17:13:15 MST 2013 >kill -USR1 52671 >selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 52671 killed at Wed Mar 6 17:13:15 MST 2013 >ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:15 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 52746 >/dev/null 2>/dev/null >selfserv_9218 with PID 52746 found at Wed Mar 6 17:13:15 MST 2013 >selfserv_9218 with PID 52746 started at Wed Mar 6 17:13:15 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -c 100 -C c -V :ssl3 -N -n TestUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:15 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:13:16 MST 2013 >ssl.sh: #984: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 52746 at Wed Mar 6 17:13:16 MST 2013 >kill -USR1 52746 >selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 52746 killed at Wed Mar 6 17:13:16 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:16 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 52821 >/dev/null 2>/dev/null >selfserv_9218 with PID 52821 found at Wed Mar 6 17:13:16 MST 2013 >selfserv_9218 with PID 52821 started at Wed Mar 6 17:13:16 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -c 100 -C c -N -n TestUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:16 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:13:16 MST 2013 >ssl.sh: #985: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 52821 at Wed Mar 6 17:13:16 MST 2013 >kill -USR1 52821 >selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 52821 killed at Wed Mar 6 17:13:16 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:16 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -u -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 52896 >/dev/null 2>/dev/null >selfserv_9218 with PID 52896 found at Wed Mar 6 17:13:16 MST 2013 >selfserv_9218 with PID 52896 started at Wed Mar 6 17:13:16 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:16 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:13:16 MST 2013 >ssl.sh: #986: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 52896 at Wed Mar 6 17:13:16 MST 2013 >kill -USR1 52896 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 52896 killed at Wed Mar 6 17:13:16 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:16 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 52972 >/dev/null 2>/dev/null >selfserv_9218 with PID 52972 found at Wed Mar 6 17:13:16 MST 2013 >selfserv_9218 with PID 52972 started at Wed Mar 6 17:13:16 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:16 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:13:16 MST 2013 >ssl.sh: #987: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 52972 at Wed Mar 6 17:13:17 MST 2013 >kill -USR1 52972 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 52972 killed at Wed Mar 6 17:13:17 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:13:17 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:17 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 53048 >/dev/null 2>/dev/null >selfserv_9218 with PID 53048 found at Wed Mar 6 17:13:17 MST 2013 >selfserv_9218 with PID 53048 started at Wed Mar 6 17:13:17 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:17 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:13:17 MST 2013 >ssl.sh: #988: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 53048 at Wed Mar 6 17:13:17 MST 2013 >kill -USR1 53048 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 53048 killed at Wed Mar 6 17:13:17 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:17 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:17 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 53124 >/dev/null 2>/dev/null >selfserv_9218 with PID 53124 found at Wed Mar 6 17:13:17 MST 2013 >selfserv_9218 with PID 53124 started at Wed Mar 6 17:13:17 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:17 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:13:17 MST 2013 >ssl.sh: #989: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 53124 at Wed Mar 6 17:13:17 MST 2013 >kill -USR1 53124 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 53124 killed at Wed Mar 6 17:13:17 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:13:17 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:17 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 53200 >/dev/null 2>/dev/null >selfserv_9218 with PID 53200 found at Wed Mar 6 17:13:17 MST 2013 >selfserv_9218 with PID 53200 started at Wed Mar 6 17:13:17 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:17 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:13:17 MST 2013 >ssl.sh: #990: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 53200 at Wed Mar 6 17:13:17 MST 2013 >kill -USR1 53200 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 53200 killed at Wed Mar 6 17:13:17 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- >selfserv_9218 starting at Wed Mar 6 17:13:17 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:17 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 53282 >/dev/null 2>/dev/null >selfserv_9218 with PID 53282 found at Wed Mar 6 17:13:17 MST 2013 >selfserv_9218 with PID 53282 started at Wed Mar 6 17:13:17 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:17 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:13:17 MST 2013 >ssl.sh: #991: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 53282 at Wed Mar 6 17:13:17 MST 2013 >kill -USR1 53282 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 53282 killed at Wed Mar 6 17:13:17 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- >selfserv_9218 starting at Wed Mar 6 17:13:18 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 53364 >/dev/null 2>/dev/null >selfserv_9218 with PID 53364 found at Wed Mar 6 17:13:18 MST 2013 >selfserv_9218 with PID 53364 started at Wed Mar 6 17:13:18 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:18 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:13:18 MST 2013 >ssl.sh: #992: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 53364 at Wed Mar 6 17:13:18 MST 2013 >kill -USR1 53364 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 53364 killed at Wed Mar 6 17:13:18 MST 2013 >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) >ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client normal =============================== >selfserv_9218 starting at Wed Mar 6 17:13:18 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:18 MST 2013 >selfserv_9218 with PID 53517 started at Wed Mar 6 17:13:18 MST 2013 >ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test >ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #993: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #994: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #995: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c f -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #996: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c g -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #997: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #998: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #999: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1000: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c l -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1001: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c m -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1002: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1003: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1004: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1005: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1006: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1007: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1008: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1009: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c f -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1010: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c g -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1011: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1012: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1013: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1014: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c l -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1015: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c m -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1016: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1017: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1018: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1019: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1020: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1021: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1022: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1023: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1024: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1025: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1026: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c l -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1027: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c m -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1028: TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1029: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1030: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1031: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- >kill -0 53517 >/dev/null 2>/dev/null >selfserv_9218 with PID 53517 found at Wed Mar 6 17:13:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1032: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >trying to kill selfserv_9218 with PID 53517 at Wed Mar 6 17:13:20 MST 2013 >kill -USR1 53517 >selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 53517 killed at Wed Mar 6 17:13:20 MST 2013 >ssl.sh: SSL Client Authentication Extended Test - server bypass/client normal =============================== >ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:20 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 55025 >/dev/null 2>/dev/null >selfserv_9218 with PID 55025 found at Wed Mar 6 17:13:20 MST 2013 >selfserv_9218 with PID 55025 started at Wed Mar 6 17:13:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1033: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 55025 at Wed Mar 6 17:13:20 MST 2013 >kill -USR1 55025 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 55025 killed at Wed Mar 6 17:13:20 MST 2013 >ssl.sh: TLS Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:20 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 55082 >/dev/null 2>/dev/null >selfserv_9218 with PID 55082 found at Wed Mar 6 17:13:20 MST 2013 >selfserv_9218 with PID 55082 started at Wed Mar 6 17:13:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1034: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 55082 at Wed Mar 6 17:13:20 MST 2013 >kill -USR1 55082 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 55082 killed at Wed Mar 6 17:13:20 MST 2013 >ssl.sh: TLS Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:20 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 55139 >/dev/null 2>/dev/null >selfserv_9218 with PID 55139 found at Wed Mar 6 17:13:20 MST 2013 >selfserv_9218 with PID 55139 started at Wed Mar 6 17:13:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1035: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 55139 at Wed Mar 6 17:13:21 MST 2013 >kill -USR1 55139 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 55139 killed at Wed Mar 6 17:13:21 MST 2013 >ssl.sh: TLS Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:21 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 55196 >/dev/null 2>/dev/null >selfserv_9218 with PID 55196 found at Wed Mar 6 17:13:21 MST 2013 >selfserv_9218 with PID 55196 started at Wed Mar 6 17:13:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1036: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 55196 at Wed Mar 6 17:13:21 MST 2013 >kill -USR1 55196 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 55196 killed at Wed Mar 6 17:13:21 MST 2013 >ssl.sh: TLS Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:21 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 55253 >/dev/null 2>/dev/null >selfserv_9218 with PID 55253 found at Wed Mar 6 17:13:21 MST 2013 >selfserv_9218 with PID 55253 started at Wed Mar 6 17:13:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1037: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 55253 at Wed Mar 6 17:13:21 MST 2013 >kill -USR1 55253 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 55253 killed at Wed Mar 6 17:13:21 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:21 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 55310 >/dev/null 2>/dev/null >selfserv_9218 with PID 55310 found at Wed Mar 6 17:13:21 MST 2013 >selfserv_9218 with PID 55310 started at Wed Mar 6 17:13:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1038: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 55310 at Wed Mar 6 17:13:21 MST 2013 >kill -USR1 55310 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 55310 killed at Wed Mar 6 17:13:21 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:21 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 55367 >/dev/null 2>/dev/null >selfserv_9218 with PID 55367 found at Wed Mar 6 17:13:21 MST 2013 >selfserv_9218 with PID 55367 started at Wed Mar 6 17:13:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1039: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 55367 at Wed Mar 6 17:13:21 MST 2013 >kill -USR1 55367 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 55367 killed at Wed Mar 6 17:13:21 MST 2013 >ssl.sh: SSL3 Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:21 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 55424 >/dev/null 2>/dev/null >selfserv_9218 with PID 55424 found at Wed Mar 6 17:13:21 MST 2013 >selfserv_9218 with PID 55424 started at Wed Mar 6 17:13:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1040: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 55424 at Wed Mar 6 17:13:21 MST 2013 >kill -USR1 55424 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 55424 killed at Wed Mar 6 17:13:21 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:21 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 55481 >/dev/null 2>/dev/null >selfserv_9218 with PID 55481 found at Wed Mar 6 17:13:21 MST 2013 >selfserv_9218 with PID 55481 started at Wed Mar 6 17:13:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1041: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 55481 at Wed Mar 6 17:13:22 MST 2013 >kill -USR1 55481 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 55481 killed at Wed Mar 6 17:13:22 MST 2013 >ssl.sh: SSL3 Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:22 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 55538 >/dev/null 2>/dev/null >selfserv_9218 with PID 55538 found at Wed Mar 6 17:13:22 MST 2013 >selfserv_9218 with PID 55538 started at Wed Mar 6 17:13:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1042: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 55538 at Wed Mar 6 17:13:22 MST 2013 >kill -USR1 55538 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 55538 killed at Wed Mar 6 17:13:22 MST 2013 >ssl.sh: SSL3 Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:22 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 55595 >/dev/null 2>/dev/null >selfserv_9218 with PID 55595 found at Wed Mar 6 17:13:22 MST 2013 >selfserv_9218 with PID 55595 started at Wed Mar 6 17:13:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1043: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 55595 at Wed Mar 6 17:13:22 MST 2013 >kill -USR1 55595 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 55595 killed at Wed Mar 6 17:13:22 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:22 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 55652 >/dev/null 2>/dev/null >selfserv_9218 with PID 55652 found at Wed Mar 6 17:13:22 MST 2013 >selfserv_9218 with PID 55652 started at Wed Mar 6 17:13:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1044: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 55652 at Wed Mar 6 17:13:22 MST 2013 >kill -USR1 55652 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 55652 killed at Wed Mar 6 17:13:22 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:22 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 55709 >/dev/null 2>/dev/null >selfserv_9218 with PID 55709 found at Wed Mar 6 17:13:22 MST 2013 >selfserv_9218 with PID 55709 started at Wed Mar 6 17:13:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1045: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 55709 at Wed Mar 6 17:13:22 MST 2013 >kill -USR1 55709 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 55709 killed at Wed Mar 6 17:13:22 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:22 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 55766 >/dev/null 2>/dev/null >selfserv_9218 with PID 55766 found at Wed Mar 6 17:13:22 MST 2013 >selfserv_9218 with PID 55766 started at Wed Mar 6 17:13:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1046: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 55766 at Wed Mar 6 17:13:22 MST 2013 >kill -USR1 55766 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 55766 killed at Wed Mar 6 17:13:22 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:22 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 55823 >/dev/null 2>/dev/null >selfserv_9218 with PID 55823 found at Wed Mar 6 17:13:22 MST 2013 >selfserv_9218 with PID 55823 started at Wed Mar 6 17:13:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1047: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 55823 at Wed Mar 6 17:13:23 MST 2013 >kill -USR1 55823 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 55823 killed at Wed Mar 6 17:13:23 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:23 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 55880 >/dev/null 2>/dev/null >selfserv_9218 with PID 55880 found at Wed Mar 6 17:13:23 MST 2013 >selfserv_9218 with PID 55880 started at Wed Mar 6 17:13:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1048: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 55880 at Wed Mar 6 17:13:23 MST 2013 >kill -USR1 55880 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 55880 killed at Wed Mar 6 17:13:23 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:23 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 55937 >/dev/null 2>/dev/null >selfserv_9218 with PID 55937 found at Wed Mar 6 17:13:23 MST 2013 >selfserv_9218 with PID 55937 started at Wed Mar 6 17:13:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1049: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 55937 at Wed Mar 6 17:13:23 MST 2013 >kill -USR1 55937 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 55937 killed at Wed Mar 6 17:13:23 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:23 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 55994 >/dev/null 2>/dev/null >selfserv_9218 with PID 55994 found at Wed Mar 6 17:13:23 MST 2013 >selfserv_9218 with PID 55994 started at Wed Mar 6 17:13:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1050: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 55994 at Wed Mar 6 17:13:23 MST 2013 >kill -USR1 55994 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 55994 killed at Wed Mar 6 17:13:23 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:23 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 56051 >/dev/null 2>/dev/null >selfserv_9218 with PID 56051 found at Wed Mar 6 17:13:23 MST 2013 >selfserv_9218 with PID 56051 started at Wed Mar 6 17:13:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1051: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 56051 at Wed Mar 6 17:13:23 MST 2013 >kill -USR1 56051 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 56051 killed at Wed Mar 6 17:13:23 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:23 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 56108 >/dev/null 2>/dev/null >selfserv_9218 with PID 56108 found at Wed Mar 6 17:13:23 MST 2013 >selfserv_9218 with PID 56108 started at Wed Mar 6 17:13:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1052: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 56108 at Wed Mar 6 17:13:23 MST 2013 >kill -USR1 56108 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 56108 killed at Wed Mar 6 17:13:23 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:23 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 56165 >/dev/null 2>/dev/null >selfserv_9218 with PID 56165 found at Wed Mar 6 17:13:23 MST 2013 >selfserv_9218 with PID 56165 started at Wed Mar 6 17:13:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1053: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 56165 at Wed Mar 6 17:13:23 MST 2013 >kill -USR1 56165 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 56165 killed at Wed Mar 6 17:13:23 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:24 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 56222 >/dev/null 2>/dev/null >selfserv_9218 with PID 56222 found at Wed Mar 6 17:13:24 MST 2013 >selfserv_9218 with PID 56222 started at Wed Mar 6 17:13:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1054: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 56222 at Wed Mar 6 17:13:24 MST 2013 >kill -USR1 56222 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 56222 killed at Wed Mar 6 17:13:24 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:24 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 56279 >/dev/null 2>/dev/null >selfserv_9218 with PID 56279 found at Wed Mar 6 17:13:24 MST 2013 >selfserv_9218 with PID 56279 started at Wed Mar 6 17:13:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1055: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 56279 at Wed Mar 6 17:13:24 MST 2013 >kill -USR1 56279 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 56279 killed at Wed Mar 6 17:13:24 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:24 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 56336 >/dev/null 2>/dev/null >selfserv_9218 with PID 56336 found at Wed Mar 6 17:13:24 MST 2013 >selfserv_9218 with PID 56336 started at Wed Mar 6 17:13:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1056: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 56336 at Wed Mar 6 17:13:24 MST 2013 >kill -USR1 56336 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 56336 killed at Wed Mar 6 17:13:24 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:24 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 56393 >/dev/null 2>/dev/null >selfserv_9218 with PID 56393 found at Wed Mar 6 17:13:24 MST 2013 >selfserv_9218 with PID 56393 started at Wed Mar 6 17:13:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1057: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 56393 at Wed Mar 6 17:13:24 MST 2013 >kill -USR1 56393 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 56393 killed at Wed Mar 6 17:13:24 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:24 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 56450 >/dev/null 2>/dev/null >selfserv_9218 with PID 56450 found at Wed Mar 6 17:13:24 MST 2013 >selfserv_9218 with PID 56450 started at Wed Mar 6 17:13:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1058: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 56450 at Wed Mar 6 17:13:24 MST 2013 >kill -USR1 56450 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 56450 killed at Wed Mar 6 17:13:24 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:24 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 56507 >/dev/null 2>/dev/null >selfserv_9218 with PID 56507 found at Wed Mar 6 17:13:24 MST 2013 >selfserv_9218 with PID 56507 started at Wed Mar 6 17:13:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1059: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 56507 at Wed Mar 6 17:13:24 MST 2013 >kill -USR1 56507 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 56507 killed at Wed Mar 6 17:13:24 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:24 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 56564 >/dev/null 2>/dev/null >selfserv_9218 with PID 56564 found at Wed Mar 6 17:13:24 MST 2013 >selfserv_9218 with PID 56564 started at Wed Mar 6 17:13:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1060: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 56564 at Wed Mar 6 17:13:25 MST 2013 >kill -USR1 56564 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 56564 killed at Wed Mar 6 17:13:25 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:25 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 56621 >/dev/null 2>/dev/null >selfserv_9218 with PID 56621 found at Wed Mar 6 17:13:25 MST 2013 >selfserv_9218 with PID 56621 started at Wed Mar 6 17:13:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1061: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 56621 at Wed Mar 6 17:13:25 MST 2013 >kill -USR1 56621 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 56621 killed at Wed Mar 6 17:13:25 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:25 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 56678 >/dev/null 2>/dev/null >selfserv_9218 with PID 56678 found at Wed Mar 6 17:13:25 MST 2013 >selfserv_9218 with PID 56678 started at Wed Mar 6 17:13:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1062: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 56678 at Wed Mar 6 17:13:25 MST 2013 >kill -USR1 56678 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 56678 killed at Wed Mar 6 17:13:25 MST 2013 >ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Server hello response without SNI for Extended Test >ssl.sh: skipping TLS Server hello response with SNI for Extended Test >ssl.sh: skipping TLS Server response with alert for Extended Test >ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test >ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test >ssl.sh: skipping TLS Server hello response without SNI for Extended Test >ssl.sh: skipping TLS Server hello response with SNI for Extended Test >ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test >ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test >ssl.sh: skipping TLS Server response with alert for Extended Test >ssl.sh: SSL Stress Test Extended Test - server bypass/client normal =============================== >ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test >ssl.sh: Stress SSL3 RC4 128 with MD5 ---- >selfserv_9218 starting at Wed Mar 6 17:13:25 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 56904 >/dev/null 2>/dev/null >selfserv_9218 with PID 56904 found at Wed Mar 6 17:13:25 MST 2013 >selfserv_9218 with PID 56904 started at Wed Mar 6 17:13:25 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -c 1000 -C c -V :ssl3 \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:25 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:13:25 MST 2013 >ssl.sh: #1063: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 56904 at Wed Mar 6 17:13:25 MST 2013 >kill -USR1 56904 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 56904 killed at Wed Mar 6 17:13:25 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 ---- >selfserv_9218 starting at Wed Mar 6 17:13:25 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 56980 >/dev/null 2>/dev/null >selfserv_9218 with PID 56980 found at Wed Mar 6 17:13:25 MST 2013 >selfserv_9218 with PID 56980 started at Wed Mar 6 17:13:25 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -c 1000 -C c \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:25 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:13:26 MST 2013 >ssl.sh: #1064: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 56980 at Wed Mar 6 17:13:26 MST 2013 >kill -USR1 56980 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 56980 killed at Wed Mar 6 17:13:26 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- >selfserv_9218 starting at Wed Mar 6 17:13:26 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 57056 >/dev/null 2>/dev/null >selfserv_9218 with PID 57056 found at Wed Mar 6 17:13:26 MST 2013 >selfserv_9218 with PID 57056 started at Wed Mar 6 17:13:26 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -c 1000 -C c -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:26 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:13:26 MST 2013 >ssl.sh: #1065: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 57056 at Wed Mar 6 17:13:26 MST 2013 >kill -USR1 57056 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 57056 killed at Wed Mar 6 17:13:26 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- >selfserv_9218 starting at Wed Mar 6 17:13:26 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -u -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 57132 >/dev/null 2>/dev/null >selfserv_9218 with PID 57132 found at Wed Mar 6 17:13:26 MST 2013 >selfserv_9218 with PID 57132 started at Wed Mar 6 17:13:26 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:26 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:13:26 MST 2013 >ssl.sh: #1066: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 57132 at Wed Mar 6 17:13:26 MST 2013 >kill -USR1 57132 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 57132 killed at Wed Mar 6 17:13:26 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- >selfserv_9218 starting at Wed Mar 6 17:13:26 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 57208 >/dev/null 2>/dev/null >selfserv_9218 with PID 57208 found at Wed Mar 6 17:13:27 MST 2013 >selfserv_9218 with PID 57208 started at Wed Mar 6 17:13:27 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:27 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:13:27 MST 2013 >ssl.sh: #1067: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 57208 at Wed Mar 6 17:13:27 MST 2013 >kill -USR1 57208 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 57208 killed at Wed Mar 6 17:13:27 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- >selfserv_9218 starting at Wed Mar 6 17:13:27 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 57284 >/dev/null 2>/dev/null >selfserv_9218 with PID 57284 found at Wed Mar 6 17:13:27 MST 2013 >selfserv_9218 with PID 57284 started at Wed Mar 6 17:13:27 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:27 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:13:27 MST 2013 >ssl.sh: #1068: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 57284 at Wed Mar 6 17:13:27 MST 2013 >kill -USR1 57284 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 57284 killed at Wed Mar 6 17:13:27 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:13:27 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 57360 >/dev/null 2>/dev/null >selfserv_9218 with PID 57360 found at Wed Mar 6 17:13:27 MST 2013 >selfserv_9218 with PID 57360 started at Wed Mar 6 17:13:27 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:27 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:13:28 MST 2013 >ssl.sh: #1069: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 57360 at Wed Mar 6 17:13:28 MST 2013 >kill -USR1 57360 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 57360 killed at Wed Mar 6 17:13:28 MST 2013 >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test >ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test >ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:28 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 57465 >/dev/null 2>/dev/null >selfserv_9218 with PID 57465 found at Wed Mar 6 17:13:28 MST 2013 >selfserv_9218 with PID 57465 started at Wed Mar 6 17:13:28 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:28 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:13:28 MST 2013 >ssl.sh: #1070: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 57465 at Wed Mar 6 17:13:28 MST 2013 >kill -USR1 57465 >selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 57465 killed at Wed Mar 6 17:13:28 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:28 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 57540 >/dev/null 2>/dev/null >selfserv_9218 with PID 57540 found at Wed Mar 6 17:13:28 MST 2013 >selfserv_9218 with PID 57540 started at Wed Mar 6 17:13:28 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:28 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:13:29 MST 2013 >ssl.sh: #1071: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 57540 at Wed Mar 6 17:13:29 MST 2013 >kill -USR1 57540 >selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 57540 killed at Wed Mar 6 17:13:29 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:29 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -u -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 57615 >/dev/null 2>/dev/null >selfserv_9218 with PID 57615 found at Wed Mar 6 17:13:29 MST 2013 >selfserv_9218 with PID 57615 started at Wed Mar 6 17:13:29 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:29 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:13:29 MST 2013 >ssl.sh: #1072: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 57615 at Wed Mar 6 17:13:29 MST 2013 >kill -USR1 57615 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 57615 killed at Wed Mar 6 17:13:29 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:29 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 57691 >/dev/null 2>/dev/null >selfserv_9218 with PID 57691 found at Wed Mar 6 17:13:29 MST 2013 >selfserv_9218 with PID 57691 started at Wed Mar 6 17:13:29 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:29 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:13:29 MST 2013 >ssl.sh: #1073: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 57691 at Wed Mar 6 17:13:29 MST 2013 >kill -USR1 57691 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 57691 killed at Wed Mar 6 17:13:29 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:13:29 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 57767 >/dev/null 2>/dev/null >selfserv_9218 with PID 57767 found at Wed Mar 6 17:13:29 MST 2013 >selfserv_9218 with PID 57767 started at Wed Mar 6 17:13:29 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:29 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:13:29 MST 2013 >ssl.sh: #1074: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 57767 at Wed Mar 6 17:13:29 MST 2013 >kill -USR1 57767 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 57767 killed at Wed Mar 6 17:13:29 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:29 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 57843 >/dev/null 2>/dev/null >selfserv_9218 with PID 57843 found at Wed Mar 6 17:13:29 MST 2013 >selfserv_9218 with PID 57843 started at Wed Mar 6 17:13:29 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:29 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:13:29 MST 2013 >ssl.sh: #1075: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 57843 at Wed Mar 6 17:13:29 MST 2013 >kill -USR1 57843 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 57843 killed at Wed Mar 6 17:13:29 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:13:30 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 57919 >/dev/null 2>/dev/null >selfserv_9218 with PID 57919 found at Wed Mar 6 17:13:30 MST 2013 >selfserv_9218 with PID 57919 started at Wed Mar 6 17:13:30 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:30 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:13:30 MST 2013 >ssl.sh: #1076: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 57919 at Wed Mar 6 17:13:30 MST 2013 >kill -USR1 57919 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 57919 killed at Wed Mar 6 17:13:30 MST 2013 >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) >ssl.sh: SSL Cipher Coverage - server normal/client bypass =============================== >selfserv_9218 starting at Wed Mar 6 17:13:30 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:30 MST 2013 >selfserv_9218 with PID 58086 started at Wed Mar 6 17:13:30 MST 2013 >ssl.sh: running SSL2_RC4_128_WITH_MD5 ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c A -V ssl2:ssl3 -O -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1077: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c B -V ssl2:tls1.0 -O -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1078: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c C -V ssl2:tls1.0 -O -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1079: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c D -V ssl2:ssl3 -O -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1080: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c E -V ssl2:tls1.0 -O -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1081: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c F -V ssl2:ssl3 -O -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1082: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c B -V ssl2:tls1.1 -O -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1083: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c C -V ssl2:tls1.1 -O -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1084: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c E -V ssl2:tls1.1 -O -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1085: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1086: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1087: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1088: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c f -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1089: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c g -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1090: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1091: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1092: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1093: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c l -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1094: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c m -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1095: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1096: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1097: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1098: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1099: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1100: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1101: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1102: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c f -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1103: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c g -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1104: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1105: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1106: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1107: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c l -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1108: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c m -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1109: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1110: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1111: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1112: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1113: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1114: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1115: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1116: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1117: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1118: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1119: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c l -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1120: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c m -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1121: TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1122: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1123: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1124: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- >kill -0 58086 >/dev/null 2>/dev/null >selfserv_9218 with PID 58086 found at Wed Mar 6 17:13:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1125: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >trying to kill selfserv_9218 with PID 58086 at Wed Mar 6 17:13:33 MST 2013 >kill -USR1 58086 >selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 58086 killed at Wed Mar 6 17:13:33 MST 2013 >ssl.sh: SSL Client Authentication - server normal/client bypass =============================== >ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:33 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59767 >/dev/null 2>/dev/null >selfserv_9218 with PID 59767 found at Wed Mar 6 17:13:33 MST 2013 >selfserv_9218 with PID 59767 started at Wed Mar 6 17:13:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1126: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 59767 at Wed Mar 6 17:13:33 MST 2013 >kill -USR1 59767 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59767 killed at Wed Mar 6 17:13:33 MST 2013 >ssl.sh: TLS Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:33 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59824 >/dev/null 2>/dev/null >selfserv_9218 with PID 59824 found at Wed Mar 6 17:13:33 MST 2013 >selfserv_9218 with PID 59824 started at Wed Mar 6 17:13:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1127: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 59824 at Wed Mar 6 17:13:33 MST 2013 >kill -USR1 59824 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59824 killed at Wed Mar 6 17:13:33 MST 2013 >ssl.sh: TLS Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:33 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59881 >/dev/null 2>/dev/null >selfserv_9218 with PID 59881 found at Wed Mar 6 17:13:33 MST 2013 >selfserv_9218 with PID 59881 started at Wed Mar 6 17:13:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1128: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 59881 at Wed Mar 6 17:13:33 MST 2013 >kill -USR1 59881 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59881 killed at Wed Mar 6 17:13:33 MST 2013 >ssl.sh: TLS Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:33 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59938 >/dev/null 2>/dev/null >selfserv_9218 with PID 59938 found at Wed Mar 6 17:13:33 MST 2013 >selfserv_9218 with PID 59938 started at Wed Mar 6 17:13:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1129: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 59938 at Wed Mar 6 17:13:33 MST 2013 >kill -USR1 59938 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59938 killed at Wed Mar 6 17:13:33 MST 2013 >ssl.sh: TLS Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:34 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59995 >/dev/null 2>/dev/null >selfserv_9218 with PID 59995 found at Wed Mar 6 17:13:34 MST 2013 >selfserv_9218 with PID 59995 started at Wed Mar 6 17:13:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1130: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 59995 at Wed Mar 6 17:13:34 MST 2013 >kill -USR1 59995 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59995 killed at Wed Mar 6 17:13:34 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:34 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60052 >/dev/null 2>/dev/null >selfserv_9218 with PID 60052 found at Wed Mar 6 17:13:34 MST 2013 >selfserv_9218 with PID 60052 started at Wed Mar 6 17:13:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1131: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60052 at Wed Mar 6 17:13:34 MST 2013 >kill -USR1 60052 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60052 killed at Wed Mar 6 17:13:34 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:34 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60109 >/dev/null 2>/dev/null >selfserv_9218 with PID 60109 found at Wed Mar 6 17:13:34 MST 2013 >selfserv_9218 with PID 60109 started at Wed Mar 6 17:13:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1132: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60109 at Wed Mar 6 17:13:34 MST 2013 >kill -USR1 60109 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60109 killed at Wed Mar 6 17:13:34 MST 2013 >ssl.sh: SSL3 Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:34 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60166 >/dev/null 2>/dev/null >selfserv_9218 with PID 60166 found at Wed Mar 6 17:13:34 MST 2013 >selfserv_9218 with PID 60166 started at Wed Mar 6 17:13:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1133: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60166 at Wed Mar 6 17:13:34 MST 2013 >kill -USR1 60166 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60166 killed at Wed Mar 6 17:13:34 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:34 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60223 >/dev/null 2>/dev/null >selfserv_9218 with PID 60223 found at Wed Mar 6 17:13:34 MST 2013 >selfserv_9218 with PID 60223 started at Wed Mar 6 17:13:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1134: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60223 at Wed Mar 6 17:13:34 MST 2013 >kill -USR1 60223 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60223 killed at Wed Mar 6 17:13:34 MST 2013 >ssl.sh: SSL3 Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:34 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60280 >/dev/null 2>/dev/null >selfserv_9218 with PID 60280 found at Wed Mar 6 17:13:35 MST 2013 >selfserv_9218 with PID 60280 started at Wed Mar 6 17:13:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1135: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 60280 at Wed Mar 6 17:13:35 MST 2013 >kill -USR1 60280 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60280 killed at Wed Mar 6 17:13:35 MST 2013 >ssl.sh: SSL3 Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60337 >/dev/null 2>/dev/null >selfserv_9218 with PID 60337 found at Wed Mar 6 17:13:35 MST 2013 >selfserv_9218 with PID 60337 started at Wed Mar 6 17:13:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1136: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 60337 at Wed Mar 6 17:13:35 MST 2013 >kill -USR1 60337 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60337 killed at Wed Mar 6 17:13:35 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60394 >/dev/null 2>/dev/null >selfserv_9218 with PID 60394 found at Wed Mar 6 17:13:35 MST 2013 >selfserv_9218 with PID 60394 started at Wed Mar 6 17:13:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1137: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60394 at Wed Mar 6 17:13:35 MST 2013 >kill -USR1 60394 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60394 killed at Wed Mar 6 17:13:35 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60451 >/dev/null 2>/dev/null >selfserv_9218 with PID 60451 found at Wed Mar 6 17:13:35 MST 2013 >selfserv_9218 with PID 60451 started at Wed Mar 6 17:13:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1138: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60451 at Wed Mar 6 17:13:35 MST 2013 >kill -USR1 60451 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60451 killed at Wed Mar 6 17:13:35 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60508 >/dev/null 2>/dev/null >selfserv_9218 with PID 60508 found at Wed Mar 6 17:13:35 MST 2013 >selfserv_9218 with PID 60508 started at Wed Mar 6 17:13:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1139: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60508 at Wed Mar 6 17:13:35 MST 2013 >kill -USR1 60508 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60508 killed at Wed Mar 6 17:13:35 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60565 >/dev/null 2>/dev/null >selfserv_9218 with PID 60565 found at Wed Mar 6 17:13:35 MST 2013 >selfserv_9218 with PID 60565 started at Wed Mar 6 17:13:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1140: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60565 at Wed Mar 6 17:13:36 MST 2013 >kill -USR1 60565 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60565 killed at Wed Mar 6 17:13:36 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:36 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60622 >/dev/null 2>/dev/null >selfserv_9218 with PID 60622 found at Wed Mar 6 17:13:36 MST 2013 >selfserv_9218 with PID 60622 started at Wed Mar 6 17:13:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1141: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 60622 at Wed Mar 6 17:13:36 MST 2013 >kill -USR1 60622 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60622 killed at Wed Mar 6 17:13:36 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:36 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60679 >/dev/null 2>/dev/null >selfserv_9218 with PID 60679 found at Wed Mar 6 17:13:36 MST 2013 >selfserv_9218 with PID 60679 started at Wed Mar 6 17:13:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1142: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 60679 at Wed Mar 6 17:13:36 MST 2013 >kill -USR1 60679 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60679 killed at Wed Mar 6 17:13:36 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:36 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60736 >/dev/null 2>/dev/null >selfserv_9218 with PID 60736 found at Wed Mar 6 17:13:36 MST 2013 >selfserv_9218 with PID 60736 started at Wed Mar 6 17:13:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1143: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60736 at Wed Mar 6 17:13:36 MST 2013 >kill -USR1 60736 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60736 killed at Wed Mar 6 17:13:36 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:36 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60793 >/dev/null 2>/dev/null >selfserv_9218 with PID 60793 found at Wed Mar 6 17:13:36 MST 2013 >selfserv_9218 with PID 60793 started at Wed Mar 6 17:13:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1144: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60793 at Wed Mar 6 17:13:36 MST 2013 >kill -USR1 60793 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60793 killed at Wed Mar 6 17:13:36 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:36 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60850 >/dev/null 2>/dev/null >selfserv_9218 with PID 60850 found at Wed Mar 6 17:13:36 MST 2013 >selfserv_9218 with PID 60850 started at Wed Mar 6 17:13:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1145: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60850 at Wed Mar 6 17:13:37 MST 2013 >kill -USR1 60850 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60850 killed at Wed Mar 6 17:13:37 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60907 >/dev/null 2>/dev/null >selfserv_9218 with PID 60907 found at Wed Mar 6 17:13:37 MST 2013 >selfserv_9218 with PID 60907 started at Wed Mar 6 17:13:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1146: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60907 at Wed Mar 6 17:13:37 MST 2013 >kill -USR1 60907 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60907 killed at Wed Mar 6 17:13:37 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60964 >/dev/null 2>/dev/null >selfserv_9218 with PID 60964 found at Wed Mar 6 17:13:37 MST 2013 >selfserv_9218 with PID 60964 started at Wed Mar 6 17:13:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1147: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 60964 at Wed Mar 6 17:13:37 MST 2013 >kill -USR1 60964 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60964 killed at Wed Mar 6 17:13:37 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61021 >/dev/null 2>/dev/null >selfserv_9218 with PID 61021 found at Wed Mar 6 17:13:37 MST 2013 >selfserv_9218 with PID 61021 started at Wed Mar 6 17:13:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1148: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 61021 at Wed Mar 6 17:13:37 MST 2013 >kill -USR1 61021 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61021 killed at Wed Mar 6 17:13:37 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61078 >/dev/null 2>/dev/null >selfserv_9218 with PID 61078 found at Wed Mar 6 17:13:37 MST 2013 >selfserv_9218 with PID 61078 started at Wed Mar 6 17:13:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1149: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 61078 at Wed Mar 6 17:13:37 MST 2013 >kill -USR1 61078 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61078 killed at Wed Mar 6 17:13:37 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61135 >/dev/null 2>/dev/null >selfserv_9218 with PID 61135 found at Wed Mar 6 17:13:37 MST 2013 >selfserv_9218 with PID 61135 started at Wed Mar 6 17:13:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1150: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 61135 at Wed Mar 6 17:13:37 MST 2013 >kill -USR1 61135 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61135 killed at Wed Mar 6 17:13:37 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61192 >/dev/null 2>/dev/null >selfserv_9218 with PID 61192 found at Wed Mar 6 17:13:38 MST 2013 >selfserv_9218 with PID 61192 started at Wed Mar 6 17:13:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1151: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 61192 at Wed Mar 6 17:13:38 MST 2013 >kill -USR1 61192 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61192 killed at Wed Mar 6 17:13:38 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61249 >/dev/null 2>/dev/null >selfserv_9218 with PID 61249 found at Wed Mar 6 17:13:38 MST 2013 >selfserv_9218 with PID 61249 started at Wed Mar 6 17:13:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1152: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 61249 at Wed Mar 6 17:13:38 MST 2013 >kill -USR1 61249 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61249 killed at Wed Mar 6 17:13:38 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61306 >/dev/null 2>/dev/null >selfserv_9218 with PID 61306 found at Wed Mar 6 17:13:38 MST 2013 >selfserv_9218 with PID 61306 started at Wed Mar 6 17:13:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1153: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 61306 at Wed Mar 6 17:13:38 MST 2013 >kill -USR1 61306 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61306 killed at Wed Mar 6 17:13:38 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:13:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61363 >/dev/null 2>/dev/null >selfserv_9218 with PID 61363 found at Wed Mar 6 17:13:38 MST 2013 >selfserv_9218 with PID 61363 started at Wed Mar 6 17:13:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1154: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 61363 at Wed Mar 6 17:13:38 MST 2013 >kill -USR1 61363 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61363 killed at Wed Mar 6 17:13:38 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61420 >/dev/null 2>/dev/null >selfserv_9218 with PID 61420 found at Wed Mar 6 17:13:38 MST 2013 >selfserv_9218 with PID 61420 started at Wed Mar 6 17:13:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1155: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 61420 at Wed Mar 6 17:13:38 MST 2013 >kill -USR1 61420 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61420 killed at Wed Mar 6 17:13:38 MST 2013 >ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: TLS Server hello response without SNI ---- >selfserv_9218 starting at Wed Mar 6 17:13:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61553 >/dev/null 2>/dev/null >selfserv_9218 with PID 61553 found at Wed Mar 6 17:13:39 MST 2013 >selfserv_9218 with PID 61553 started at Wed Mar 6 17:13:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1156: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 61553 at Wed Mar 6 17:13:39 MST 2013 >kill -USR1 61553 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61553 killed at Wed Mar 6 17:13:39 MST 2013 >ssl.sh: TLS Server hello response with SNI ---- >selfserv_9218 starting at Wed Mar 6 17:13:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61616 >/dev/null 2>/dev/null >selfserv_9218 with PID 61616 found at Wed Mar 6 17:13:39 MST 2013 >selfserv_9218 with PID 61616 started at Wed Mar 6 17:13:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1157: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 61616 at Wed Mar 6 17:13:39 MST 2013 >kill -USR1 61616 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61616 killed at Wed Mar 6 17:13:39 MST 2013 >ssl.sh: TLS Server response with alert ---- >selfserv_9218 starting at Wed Mar 6 17:13:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61679 >/dev/null 2>/dev/null >selfserv_9218 with PID 61679 found at Wed Mar 6 17:13:39 MST 2013 >selfserv_9218 with PID 61679 started at Wed Mar 6 17:13:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. >tstclnt: exiting with return code 254 >ssl.sh: #1158: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 61679 at Wed Mar 6 17:13:39 MST 2013 >kill -USR1 61679 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61679 killed at Wed Mar 6 17:13:39 MST 2013 >ssl.sh: SSL3 Server hello response without SNI ---- >selfserv_9218 starting at Wed Mar 6 17:13:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61742 >/dev/null 2>/dev/null >selfserv_9218 with PID 61742 found at Wed Mar 6 17:13:39 MST 2013 >selfserv_9218 with PID 61742 started at Wed Mar 6 17:13:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:ssl3 -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1159: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 61742 at Wed Mar 6 17:13:39 MST 2013 >kill -USR1 61742 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61742 killed at Wed Mar 6 17:13:39 MST 2013 >ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- >selfserv_9218 starting at Wed Mar 6 17:13:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61805 >/dev/null 2>/dev/null >selfserv_9218 with PID 61805 found at Wed Mar 6 17:13:39 MST 2013 >selfserv_9218 with PID 61805 started at Wed Mar 6 17:13:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:ssl3 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12271: >SSL peer cannot verify your certificate. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1160: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 61805 at Wed Mar 6 17:13:39 MST 2013 >kill -USR1 61805 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61805 killed at Wed Mar 6 17:13:39 MST 2013 >ssl.sh: TLS Server hello response without SNI ---- >selfserv_9218 starting at Wed Mar 6 17:13:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61868 >/dev/null 2>/dev/null >selfserv_9218 with PID 61868 found at Wed Mar 6 17:13:40 MST 2013 >selfserv_9218 with PID 61868 started at Wed Mar 6 17:13:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1161: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 61868 at Wed Mar 6 17:13:40 MST 2013 >kill -USR1 61868 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61868 killed at Wed Mar 6 17:13:40 MST 2013 >ssl.sh: TLS Server hello response with SNI ---- >selfserv_9218 starting at Wed Mar 6 17:13:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61931 >/dev/null 2>/dev/null >selfserv_9218 with PID 61931 found at Wed Mar 6 17:13:40 MST 2013 >selfserv_9218 with PID 61931 started at Wed Mar 6 17:13:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1162: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 61931 at Wed Mar 6 17:13:40 MST 2013 >kill -USR1 61931 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61931 killed at Wed Mar 6 17:13:40 MST 2013 >ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- >selfserv_9218 starting at Wed Mar 6 17:13:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61994 >/dev/null 2>/dev/null >selfserv_9218 with PID 61994 found at Wed Mar 6 17:13:40 MST 2013 >selfserv_9218 with PID 61994 started at Wed Mar 6 17:13:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). >tstclnt: exiting with return code 1 >ssl.sh: #1163: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 61994 at Wed Mar 6 17:13:40 MST 2013 >kill -USR1 61994 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61994 killed at Wed Mar 6 17:13:40 MST 2013 >ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- >selfserv_9218 starting at Wed Mar 6 17:13:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62057 >/dev/null 2>/dev/null >selfserv_9218 with PID 62057 found at Wed Mar 6 17:13:40 MST 2013 >selfserv_9218 with PID 62057 started at Wed Mar 6 17:13:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. >tstclnt: exiting with return code 1 >ssl.sh: #1164: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 62057 at Wed Mar 6 17:13:40 MST 2013 >kill -USR1 62057 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62057 killed at Wed Mar 6 17:13:40 MST 2013 >ssl.sh: TLS Server response with alert ---- >selfserv_9218 starting at Wed Mar 6 17:13:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62120 >/dev/null 2>/dev/null >selfserv_9218 with PID 62120 found at Wed Mar 6 17:13:40 MST 2013 >selfserv_9218 with PID 62120 started at Wed Mar 6 17:13:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. >tstclnt: exiting with return code 254 >ssl.sh: #1165: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 62120 at Wed Mar 6 17:13:40 MST 2013 >kill -USR1 62120 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62120 killed at Wed Mar 6 17:13:40 MST 2013 >ssl.sh: SSL Stress Test - server normal/client bypass =============================== >ssl.sh: Stress SSL2 RC4 128 with MD5 ---- >selfserv_9218 starting at Wed Mar 6 17:13:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62252 >/dev/null 2>/dev/null >selfserv_9218 with PID 62252 found at Wed Mar 6 17:13:41 MST 2013 >selfserv_9218 with PID 62252 started at Wed Mar 6 17:13:41 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -c 1000 -C A \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:41 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: SSL2 - 1 server certificates tested. >strsclnt completed at Wed Mar 6 17:13:41 MST 2013 >ssl.sh: #1166: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 62252 at Wed Mar 6 17:13:41 MST 2013 >kill -USR1 62252 >selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62252 killed at Wed Mar 6 17:13:41 MST 2013 >ssl.sh: Stress SSL3 RC4 128 with MD5 ---- >selfserv_9218 starting at Wed Mar 6 17:13:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62328 >/dev/null 2>/dev/null >selfserv_9218 with PID 62328 found at Wed Mar 6 17:13:41 MST 2013 >selfserv_9218 with PID 62328 started at Wed Mar 6 17:13:41 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:41 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:13:41 MST 2013 >ssl.sh: #1167: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 62328 at Wed Mar 6 17:13:41 MST 2013 >kill -USR1 62328 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62328 killed at Wed Mar 6 17:13:41 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 ---- >selfserv_9218 starting at Wed Mar 6 17:13:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62404 >/dev/null 2>/dev/null >selfserv_9218 with PID 62404 found at Wed Mar 6 17:13:41 MST 2013 >selfserv_9218 with PID 62404 started at Wed Mar 6 17:13:41 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -c 1000 -C c \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:41 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:13:41 MST 2013 >ssl.sh: #1168: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 62404 at Wed Mar 6 17:13:41 MST 2013 >kill -USR1 62404 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62404 killed at Wed Mar 6 17:13:42 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- >selfserv_9218 starting at Wed Mar 6 17:13:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62480 >/dev/null 2>/dev/null >selfserv_9218 with PID 62480 found at Wed Mar 6 17:13:42 MST 2013 >selfserv_9218 with PID 62480 started at Wed Mar 6 17:13:42 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -c 1000 -C c -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:42 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:13:42 MST 2013 >ssl.sh: #1169: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 62480 at Wed Mar 6 17:13:42 MST 2013 >kill -USR1 62480 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62480 killed at Wed Mar 6 17:13:42 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- >selfserv_9218 starting at Wed Mar 6 17:13:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -u -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62556 >/dev/null 2>/dev/null >selfserv_9218 with PID 62556 found at Wed Mar 6 17:13:42 MST 2013 >selfserv_9218 with PID 62556 started at Wed Mar 6 17:13:42 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:42 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:13:42 MST 2013 >ssl.sh: #1170: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 62556 at Wed Mar 6 17:13:42 MST 2013 >kill -USR1 62556 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62556 killed at Wed Mar 6 17:13:42 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- >selfserv_9218 starting at Wed Mar 6 17:13:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62632 >/dev/null 2>/dev/null >selfserv_9218 with PID 62632 found at Wed Mar 6 17:13:42 MST 2013 >selfserv_9218 with PID 62632 started at Wed Mar 6 17:13:42 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:42 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:13:43 MST 2013 >ssl.sh: #1171: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 62632 at Wed Mar 6 17:13:43 MST 2013 >kill -USR1 62632 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62632 killed at Wed Mar 6 17:13:43 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- >selfserv_9218 starting at Wed Mar 6 17:13:43 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62708 >/dev/null 2>/dev/null >selfserv_9218 with PID 62708 found at Wed Mar 6 17:13:43 MST 2013 >selfserv_9218 with PID 62708 started at Wed Mar 6 17:13:43 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:43 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:13:43 MST 2013 >ssl.sh: #1172: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 62708 at Wed Mar 6 17:13:43 MST 2013 >kill -USR1 62708 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62708 killed at Wed Mar 6 17:13:43 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:13:43 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62784 >/dev/null 2>/dev/null >selfserv_9218 with PID 62784 found at Wed Mar 6 17:13:43 MST 2013 >selfserv_9218 with PID 62784 started at Wed Mar 6 17:13:43 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:43 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:13:43 MST 2013 >ssl.sh: #1173: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 62784 at Wed Mar 6 17:13:43 MST 2013 >kill -USR1 62784 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62784 killed at Wed Mar 6 17:13:43 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- >selfserv_9218 starting at Wed Mar 6 17:13:44 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -u -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62866 >/dev/null 2>/dev/null >selfserv_9218 with PID 62866 found at Wed Mar 6 17:13:45 MST 2013 >selfserv_9218 with PID 62866 started at Wed Mar 6 17:13:45 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:45 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:13:45 MST 2013 >ssl.sh: #1174: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 62866 at Wed Mar 6 17:13:45 MST 2013 >kill -USR1 62866 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62866 killed at Wed Mar 6 17:13:45 MST 2013 >ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:45 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62963 >/dev/null 2>/dev/null >selfserv_9218 with PID 62963 found at Wed Mar 6 17:13:46 MST 2013 >selfserv_9218 with PID 62963 started at Wed Mar 6 17:13:46 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:46 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: SSL2 - 100 server certificates tested. >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:13:46 MST 2013 >ssl.sh: #1175: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 62963 at Wed Mar 6 17:13:46 MST 2013 >kill -USR1 62963 >selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62963 killed at Wed Mar 6 17:13:46 MST 2013 >ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:46 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 63038 >/dev/null 2>/dev/null >selfserv_9218 with PID 63038 found at Wed Mar 6 17:13:47 MST 2013 >selfserv_9218 with PID 63038 started at Wed Mar 6 17:13:47 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:47 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:13:48 MST 2013 >ssl.sh: #1176: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 63038 at Wed Mar 6 17:13:48 MST 2013 >kill -USR1 63038 >selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 63038 killed at Wed Mar 6 17:13:48 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:48 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 63113 >/dev/null 2>/dev/null >selfserv_9218 with PID 63113 found at Wed Mar 6 17:13:49 MST 2013 >selfserv_9218 with PID 63113 started at Wed Mar 6 17:13:49 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:49 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:13:49 MST 2013 >ssl.sh: #1177: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 63113 at Wed Mar 6 17:13:49 MST 2013 >kill -USR1 63113 >selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 63113 killed at Wed Mar 6 17:13:49 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:49 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -u -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:49 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 63188 >/dev/null 2>/dev/null >selfserv_9218 with PID 63188 found at Wed Mar 6 17:13:50 MST 2013 >selfserv_9218 with PID 63188 started at Wed Mar 6 17:13:50 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:50 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:13:50 MST 2013 >ssl.sh: #1178: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 63188 at Wed Mar 6 17:13:50 MST 2013 >kill -USR1 63188 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 63188 killed at Wed Mar 6 17:13:50 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:50 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:50 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 63264 >/dev/null 2>/dev/null >selfserv_9218 with PID 63264 found at Wed Mar 6 17:13:51 MST 2013 >selfserv_9218 with PID 63264 started at Wed Mar 6 17:13:51 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:51 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:13:51 MST 2013 >ssl.sh: #1179: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 63264 at Wed Mar 6 17:13:51 MST 2013 >kill -USR1 63264 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 63264 killed at Wed Mar 6 17:13:51 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:13:51 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:51 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 63340 >/dev/null 2>/dev/null >selfserv_9218 with PID 63340 found at Wed Mar 6 17:13:52 MST 2013 >selfserv_9218 with PID 63340 started at Wed Mar 6 17:13:52 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:52 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:13:52 MST 2013 >ssl.sh: #1180: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 63340 at Wed Mar 6 17:13:52 MST 2013 >kill -USR1 63340 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 63340 killed at Wed Mar 6 17:13:52 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:13:52 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:52 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 63416 >/dev/null 2>/dev/null >selfserv_9218 with PID 63416 found at Wed Mar 6 17:13:53 MST 2013 >selfserv_9218 with PID 63416 started at Wed Mar 6 17:13:53 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:53 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:13:53 MST 2013 >ssl.sh: #1181: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 63416 at Wed Mar 6 17:13:53 MST 2013 >kill -USR1 63416 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 63416 killed at Wed Mar 6 17:13:54 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:13:54 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:54 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 63493 >/dev/null 2>/dev/null >selfserv_9218 with PID 63493 found at Wed Mar 6 17:13:55 MST 2013 >selfserv_9218 with PID 63493 started at Wed Mar 6 17:13:55 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:55 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:13:55 MST 2013 >ssl.sh: #1182: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 63493 at Wed Mar 6 17:13:55 MST 2013 >kill -USR1 63493 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 63493 killed at Wed Mar 6 17:13:55 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- >selfserv_9218 starting at Wed Mar 6 17:13:55 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:55 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 63575 >/dev/null 2>/dev/null >selfserv_9218 with PID 63575 found at Wed Mar 6 17:13:56 MST 2013 >selfserv_9218 with PID 63575 started at Wed Mar 6 17:13:56 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:56 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:13:56 MST 2013 >ssl.sh: #1183: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 63575 at Wed Mar 6 17:13:56 MST 2013 >kill -USR1 63575 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 63575 killed at Wed Mar 6 17:13:56 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- >selfserv_9218 starting at Wed Mar 6 17:13:56 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:56 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 63657 >/dev/null 2>/dev/null >selfserv_9218 with PID 63657 found at Wed Mar 6 17:13:57 MST 2013 >selfserv_9218 with PID 63657 started at Wed Mar 6 17:13:57 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:13:57 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:13:57 MST 2013 >ssl.sh: #1184: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 63657 at Wed Mar 6 17:13:57 MST 2013 >kill -USR1 63657 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 63657 killed at Wed Mar 6 17:13:57 MST 2013 >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) >ssl.sh: SSL Cipher Coverage Extended Test - server normal/client bypass =============================== >selfserv_9218 starting at Wed Mar 6 17:13:57 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:13:57 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:58 MST 2013 >selfserv_9218 with PID 63810 started at Wed Mar 6 17:13:58 MST 2013 >ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test >ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1185: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1186: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1187: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c f -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1188: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c g -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1189: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1190: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1191: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1192: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c l -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1193: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c m -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1194: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1195: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1196: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1197: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1198: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1199: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1200: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1201: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c f -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1202: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c g -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1203: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1204: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1205: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1206: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:13:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c l -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1207: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:14:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c m -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1208: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:14:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1209: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:14:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1210: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:14:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1211: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:14:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1212: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:14:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1213: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:14:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1214: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:14:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1215: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:14:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1216: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:14:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1217: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:14:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1218: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:14:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c l -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1219: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:14:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c m -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1220: TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:14:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1221: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:14:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1222: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:14:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1223: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- >kill -0 63810 >/dev/null 2>/dev/null >selfserv_9218 with PID 63810 found at Wed Mar 6 17:14:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1224: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >trying to kill selfserv_9218 with PID 63810 at Wed Mar 6 17:14:01 MST 2013 >kill -USR1 63810 >selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 63810 killed at Wed Mar 6 17:14:01 MST 2013 >ssl.sh: SSL Client Authentication Extended Test - server normal/client bypass =============================== >ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:01 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 65318 >/dev/null 2>/dev/null >selfserv_9218 with PID 65318 found at Wed Mar 6 17:14:02 MST 2013 >selfserv_9218 with PID 65318 started at Wed Mar 6 17:14:02 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1225: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 65318 at Wed Mar 6 17:14:02 MST 2013 >kill -USR1 65318 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 65318 killed at Wed Mar 6 17:14:02 MST 2013 >ssl.sh: TLS Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:02 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:02 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 65375 >/dev/null 2>/dev/null >selfserv_9218 with PID 65375 found at Wed Mar 6 17:14:03 MST 2013 >selfserv_9218 with PID 65375 started at Wed Mar 6 17:14:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1226: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 65375 at Wed Mar 6 17:14:03 MST 2013 >kill -USR1 65375 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 65375 killed at Wed Mar 6 17:14:03 MST 2013 >ssl.sh: TLS Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:03 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 65432 >/dev/null 2>/dev/null >selfserv_9218 with PID 65432 found at Wed Mar 6 17:14:04 MST 2013 >selfserv_9218 with PID 65432 started at Wed Mar 6 17:14:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1227: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 65432 at Wed Mar 6 17:14:04 MST 2013 >kill -USR1 65432 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 65432 killed at Wed Mar 6 17:14:04 MST 2013 >ssl.sh: TLS Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:04 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 65489 >/dev/null 2>/dev/null >selfserv_9218 with PID 65489 found at Wed Mar 6 17:14:04 MST 2013 >selfserv_9218 with PID 65489 started at Wed Mar 6 17:14:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1228: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 65489 at Wed Mar 6 17:14:04 MST 2013 >kill -USR1 65489 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 65489 killed at Wed Mar 6 17:14:04 MST 2013 >ssl.sh: TLS Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:04 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 654 >/dev/null 2>/dev/null >selfserv_9218 with PID 654 found at Wed Mar 6 17:14:05 MST 2013 >selfserv_9218 with PID 654 started at Wed Mar 6 17:14:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1229: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 654 at Wed Mar 6 17:14:05 MST 2013 >kill -USR1 654 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 654 killed at Wed Mar 6 17:14:05 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:05 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 712 >/dev/null 2>/dev/null >selfserv_9218 with PID 712 found at Wed Mar 6 17:14:06 MST 2013 >selfserv_9218 with PID 712 started at Wed Mar 6 17:14:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1230: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 712 at Wed Mar 6 17:14:06 MST 2013 >kill -USR1 712 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 712 killed at Wed Mar 6 17:14:06 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:06 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 809 >/dev/null 2>/dev/null >selfserv_9218 with PID 809 found at Wed Mar 6 17:14:07 MST 2013 >selfserv_9218 with PID 809 started at Wed Mar 6 17:14:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1231: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 809 at Wed Mar 6 17:14:07 MST 2013 >kill -USR1 809 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 809 killed at Wed Mar 6 17:14:07 MST 2013 >ssl.sh: SSL3 Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:07 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 876 >/dev/null 2>/dev/null >selfserv_9218 with PID 876 found at Wed Mar 6 17:14:07 MST 2013 >selfserv_9218 with PID 876 started at Wed Mar 6 17:14:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1232: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 876 at Wed Mar 6 17:14:08 MST 2013 >kill -USR1 876 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 876 killed at Wed Mar 6 17:14:08 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 936 >/dev/null 2>/dev/null >selfserv_9218 with PID 936 found at Wed Mar 6 17:14:08 MST 2013 >selfserv_9218 with PID 936 started at Wed Mar 6 17:14:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1233: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 936 at Wed Mar 6 17:14:08 MST 2013 >kill -USR1 936 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 936 killed at Wed Mar 6 17:14:08 MST 2013 >ssl.sh: SSL3 Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 993 >/dev/null 2>/dev/null >selfserv_9218 with PID 993 found at Wed Mar 6 17:14:08 MST 2013 >selfserv_9218 with PID 993 started at Wed Mar 6 17:14:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1234: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 993 at Wed Mar 6 17:14:08 MST 2013 >kill -USR1 993 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 993 killed at Wed Mar 6 17:14:08 MST 2013 >ssl.sh: SSL3 Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1051 >/dev/null 2>/dev/null >selfserv_9218 with PID 1051 found at Wed Mar 6 17:14:08 MST 2013 >selfserv_9218 with PID 1051 started at Wed Mar 6 17:14:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1235: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 1051 at Wed Mar 6 17:14:08 MST 2013 >kill -USR1 1051 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1051 killed at Wed Mar 6 17:14:08 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1108 >/dev/null 2>/dev/null >selfserv_9218 with PID 1108 found at Wed Mar 6 17:14:08 MST 2013 >selfserv_9218 with PID 1108 started at Wed Mar 6 17:14:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1236: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 1108 at Wed Mar 6 17:14:08 MST 2013 >kill -USR1 1108 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1108 killed at Wed Mar 6 17:14:08 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1165 >/dev/null 2>/dev/null >selfserv_9218 with PID 1165 found at Wed Mar 6 17:14:08 MST 2013 >selfserv_9218 with PID 1165 started at Wed Mar 6 17:14:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1237: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 1165 at Wed Mar 6 17:14:08 MST 2013 >kill -USR1 1165 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1165 killed at Wed Mar 6 17:14:08 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1222 >/dev/null 2>/dev/null >selfserv_9218 with PID 1222 found at Wed Mar 6 17:14:09 MST 2013 >selfserv_9218 with PID 1222 started at Wed Mar 6 17:14:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1238: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 1222 at Wed Mar 6 17:14:09 MST 2013 >kill -USR1 1222 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1222 killed at Wed Mar 6 17:14:09 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:09 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1280 >/dev/null 2>/dev/null >selfserv_9218 with PID 1280 found at Wed Mar 6 17:14:09 MST 2013 >selfserv_9218 with PID 1280 started at Wed Mar 6 17:14:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1239: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 1280 at Wed Mar 6 17:14:09 MST 2013 >kill -USR1 1280 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1280 killed at Wed Mar 6 17:14:09 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:09 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1435 >/dev/null 2>/dev/null >selfserv_9218 with PID 1435 found at Wed Mar 6 17:14:09 MST 2013 >selfserv_9218 with PID 1435 started at Wed Mar 6 17:14:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1240: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 1435 at Wed Mar 6 17:14:09 MST 2013 >kill -USR1 1435 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1435 killed at Wed Mar 6 17:14:09 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:09 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1495 >/dev/null 2>/dev/null >selfserv_9218 with PID 1495 found at Wed Mar 6 17:14:09 MST 2013 >selfserv_9218 with PID 1495 started at Wed Mar 6 17:14:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1241: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 1495 at Wed Mar 6 17:14:09 MST 2013 >kill -USR1 1495 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1495 killed at Wed Mar 6 17:14:09 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:09 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1552 >/dev/null 2>/dev/null >selfserv_9218 with PID 1552 found at Wed Mar 6 17:14:09 MST 2013 >selfserv_9218 with PID 1552 started at Wed Mar 6 17:14:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1242: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 1552 at Wed Mar 6 17:14:09 MST 2013 >kill -USR1 1552 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1552 killed at Wed Mar 6 17:14:09 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:09 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1609 >/dev/null 2>/dev/null >selfserv_9218 with PID 1609 found at Wed Mar 6 17:14:10 MST 2013 >selfserv_9218 with PID 1609 started at Wed Mar 6 17:14:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1243: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 1609 at Wed Mar 6 17:14:10 MST 2013 >kill -USR1 1609 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1609 killed at Wed Mar 6 17:14:10 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1666 >/dev/null 2>/dev/null >selfserv_9218 with PID 1666 found at Wed Mar 6 17:14:10 MST 2013 >selfserv_9218 with PID 1666 started at Wed Mar 6 17:14:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1244: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 1666 at Wed Mar 6 17:14:10 MST 2013 >kill -USR1 1666 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1666 killed at Wed Mar 6 17:14:10 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1723 >/dev/null 2>/dev/null >selfserv_9218 with PID 1723 found at Wed Mar 6 17:14:10 MST 2013 >selfserv_9218 with PID 1723 started at Wed Mar 6 17:14:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1245: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 1723 at Wed Mar 6 17:14:10 MST 2013 >kill -USR1 1723 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1723 killed at Wed Mar 6 17:14:10 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1788 >/dev/null 2>/dev/null >selfserv_9218 with PID 1788 found at Wed Mar 6 17:14:10 MST 2013 >selfserv_9218 with PID 1788 started at Wed Mar 6 17:14:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1246: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 1788 at Wed Mar 6 17:14:10 MST 2013 >kill -USR1 1788 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1788 killed at Wed Mar 6 17:14:10 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1895 >/dev/null 2>/dev/null >selfserv_9218 with PID 1895 found at Wed Mar 6 17:14:10 MST 2013 >selfserv_9218 with PID 1895 started at Wed Mar 6 17:14:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1247: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 1895 at Wed Mar 6 17:14:10 MST 2013 >kill -USR1 1895 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1895 killed at Wed Mar 6 17:14:10 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1952 >/dev/null 2>/dev/null >selfserv_9218 with PID 1952 found at Wed Mar 6 17:14:10 MST 2013 >selfserv_9218 with PID 1952 started at Wed Mar 6 17:14:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1248: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 1952 at Wed Mar 6 17:14:11 MST 2013 >kill -USR1 1952 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1952 killed at Wed Mar 6 17:14:11 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 2017 >/dev/null 2>/dev/null >selfserv_9218 with PID 2017 found at Wed Mar 6 17:14:11 MST 2013 >selfserv_9218 with PID 2017 started at Wed Mar 6 17:14:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1249: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 2017 at Wed Mar 6 17:14:11 MST 2013 >kill -USR1 2017 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 2017 killed at Wed Mar 6 17:14:11 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 2074 >/dev/null 2>/dev/null >selfserv_9218 with PID 2074 found at Wed Mar 6 17:14:11 MST 2013 >selfserv_9218 with PID 2074 started at Wed Mar 6 17:14:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1250: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 2074 at Wed Mar 6 17:14:11 MST 2013 >kill -USR1 2074 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 2074 killed at Wed Mar 6 17:14:11 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 2133 >/dev/null 2>/dev/null >selfserv_9218 with PID 2133 found at Wed Mar 6 17:14:11 MST 2013 >selfserv_9218 with PID 2133 started at Wed Mar 6 17:14:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1251: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 2133 at Wed Mar 6 17:14:11 MST 2013 >kill -USR1 2133 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 2133 killed at Wed Mar 6 17:14:11 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 2203 >/dev/null 2>/dev/null >selfserv_9218 with PID 2203 found at Wed Mar 6 17:14:11 MST 2013 >selfserv_9218 with PID 2203 started at Wed Mar 6 17:14:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1252: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 2203 at Wed Mar 6 17:14:11 MST 2013 >kill -USR1 2203 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 2203 killed at Wed Mar 6 17:14:11 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 2262 >/dev/null 2>/dev/null >selfserv_9218 with PID 2262 found at Wed Mar 6 17:14:11 MST 2013 >selfserv_9218 with PID 2262 started at Wed Mar 6 17:14:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1253: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 2262 at Wed Mar 6 17:14:11 MST 2013 >kill -USR1 2262 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 2262 killed at Wed Mar 6 17:14:11 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:12 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 2324 >/dev/null 2>/dev/null >selfserv_9218 with PID 2324 found at Wed Mar 6 17:14:12 MST 2013 >selfserv_9218 with PID 2324 started at Wed Mar 6 17:14:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1254: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 2324 at Wed Mar 6 17:14:12 MST 2013 >kill -USR1 2324 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 2324 killed at Wed Mar 6 17:14:12 MST 2013 >ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Server hello response without SNI for Extended Test >ssl.sh: skipping TLS Server hello response with SNI for Extended Test >ssl.sh: skipping TLS Server response with alert for Extended Test >ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test >ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test >ssl.sh: skipping TLS Server hello response without SNI for Extended Test >ssl.sh: skipping TLS Server hello response with SNI for Extended Test >ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test >ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test >ssl.sh: skipping TLS Server response with alert for Extended Test >ssl.sh: SSL Stress Test Extended Test - server normal/client bypass =============================== >ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test >ssl.sh: Stress SSL3 RC4 128 with MD5 ---- >selfserv_9218 starting at Wed Mar 6 17:14:12 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 2557 >/dev/null 2>/dev/null >selfserv_9218 with PID 2557 found at Wed Mar 6 17:14:12 MST 2013 >selfserv_9218 with PID 2557 started at Wed Mar 6 17:14:12 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:12 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:14:12 MST 2013 >ssl.sh: #1255: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 2557 at Wed Mar 6 17:14:12 MST 2013 >kill -USR1 2557 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 2557 killed at Wed Mar 6 17:14:12 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 ---- >selfserv_9218 starting at Wed Mar 6 17:14:12 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 2633 >/dev/null 2>/dev/null >selfserv_9218 with PID 2633 found at Wed Mar 6 17:14:12 MST 2013 >selfserv_9218 with PID 2633 started at Wed Mar 6 17:14:12 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -c 1000 -C c \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:12 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:14:13 MST 2013 >ssl.sh: #1256: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 2633 at Wed Mar 6 17:14:13 MST 2013 >kill -USR1 2633 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 2633 killed at Wed Mar 6 17:14:13 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- >selfserv_9218 starting at Wed Mar 6 17:14:13 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 2709 >/dev/null 2>/dev/null >selfserv_9218 with PID 2709 found at Wed Mar 6 17:14:13 MST 2013 >selfserv_9218 with PID 2709 started at Wed Mar 6 17:14:13 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:13 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:14:13 MST 2013 >ssl.sh: #1257: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 2709 at Wed Mar 6 17:14:13 MST 2013 >kill -USR1 2709 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 2709 killed at Wed Mar 6 17:14:13 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- >selfserv_9218 starting at Wed Mar 6 17:14:13 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -u -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 2785 >/dev/null 2>/dev/null >selfserv_9218 with PID 2785 found at Wed Mar 6 17:14:14 MST 2013 >selfserv_9218 with PID 2785 started at Wed Mar 6 17:14:14 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:14 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:14:14 MST 2013 >ssl.sh: #1258: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 2785 at Wed Mar 6 17:14:14 MST 2013 >kill -USR1 2785 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 2785 killed at Wed Mar 6 17:14:14 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- >selfserv_9218 starting at Wed Mar 6 17:14:14 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 2861 >/dev/null 2>/dev/null >selfserv_9218 with PID 2861 found at Wed Mar 6 17:14:15 MST 2013 >selfserv_9218 with PID 2861 started at Wed Mar 6 17:14:15 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:15 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:14:16 MST 2013 >ssl.sh: #1259: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 2861 at Wed Mar 6 17:14:16 MST 2013 >kill -USR1 2861 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 2861 killed at Wed Mar 6 17:14:16 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- >selfserv_9218 starting at Wed Mar 6 17:14:16 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 2937 >/dev/null 2>/dev/null >selfserv_9218 with PID 2937 found at Wed Mar 6 17:14:17 MST 2013 >selfserv_9218 with PID 2937 started at Wed Mar 6 17:14:17 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:17 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:14:17 MST 2013 >ssl.sh: #1260: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 2937 at Wed Mar 6 17:14:17 MST 2013 >kill -USR1 2937 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 2937 killed at Wed Mar 6 17:14:17 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:14:17 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:17 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 3013 >/dev/null 2>/dev/null >selfserv_9218 with PID 3013 found at Wed Mar 6 17:14:17 MST 2013 >selfserv_9218 with PID 3013 started at Wed Mar 6 17:14:17 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:17 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:14:17 MST 2013 >ssl.sh: #1261: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 3013 at Wed Mar 6 17:14:17 MST 2013 >kill -USR1 3013 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 3013 killed at Wed Mar 6 17:14:17 MST 2013 >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test >ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test >ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:17 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:17 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 3118 >/dev/null 2>/dev/null >selfserv_9218 with PID 3118 found at Wed Mar 6 17:14:18 MST 2013 >selfserv_9218 with PID 3118 started at Wed Mar 6 17:14:18 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:18 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:14:19 MST 2013 >ssl.sh: #1262: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 3118 at Wed Mar 6 17:14:19 MST 2013 >kill -USR1 3118 >selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 3118 killed at Wed Mar 6 17:14:19 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:19 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 3193 >/dev/null 2>/dev/null >selfserv_9218 with PID 3193 found at Wed Mar 6 17:14:20 MST 2013 >selfserv_9218 with PID 3193 started at Wed Mar 6 17:14:20 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:20 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:14:20 MST 2013 >ssl.sh: #1263: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 3193 at Wed Mar 6 17:14:20 MST 2013 >kill -USR1 3193 >selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 3193 killed at Wed Mar 6 17:14:20 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:20 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -u -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 3268 >/dev/null 2>/dev/null >selfserv_9218 with PID 3268 found at Wed Mar 6 17:14:21 MST 2013 >selfserv_9218 with PID 3268 started at Wed Mar 6 17:14:21 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:21 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:14:21 MST 2013 >ssl.sh: #1264: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 3268 at Wed Mar 6 17:14:21 MST 2013 >kill -USR1 3268 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 3268 killed at Wed Mar 6 17:14:21 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:21 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 3344 >/dev/null 2>/dev/null >selfserv_9218 with PID 3344 found at Wed Mar 6 17:14:22 MST 2013 >selfserv_9218 with PID 3344 started at Wed Mar 6 17:14:22 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:22 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:14:22 MST 2013 >ssl.sh: #1265: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 3344 at Wed Mar 6 17:14:22 MST 2013 >kill -USR1 3344 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 3344 killed at Wed Mar 6 17:14:22 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:14:22 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 3420 >/dev/null 2>/dev/null >selfserv_9218 with PID 3420 found at Wed Mar 6 17:14:23 MST 2013 >selfserv_9218 with PID 3420 started at Wed Mar 6 17:14:23 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:23 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:14:24 MST 2013 >ssl.sh: #1266: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 3420 at Wed Mar 6 17:14:24 MST 2013 >kill -USR1 3420 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 3420 killed at Wed Mar 6 17:14:24 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:24 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 3496 >/dev/null 2>/dev/null >selfserv_9218 with PID 3496 found at Wed Mar 6 17:14:25 MST 2013 >selfserv_9218 with PID 3496 started at Wed Mar 6 17:14:25 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:25 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:14:25 MST 2013 >ssl.sh: #1267: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 3496 at Wed Mar 6 17:14:25 MST 2013 >kill -USR1 3496 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 3496 killed at Wed Mar 6 17:14:25 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:14:25 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 3572 >/dev/null 2>/dev/null >selfserv_9218 with PID 3572 found at Wed Mar 6 17:14:26 MST 2013 >selfserv_9218 with PID 3572 started at Wed Mar 6 17:14:26 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:26 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:14:26 MST 2013 >ssl.sh: #1268: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 3572 at Wed Mar 6 17:14:26 MST 2013 >kill -USR1 3572 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 3572 killed at Wed Mar 6 17:14:26 MST 2013 >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) >ssl.sh: SSL - FIPS mode on for server =============================== >ssl.sh: Turning FIPS on for the server >modutil -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server -fips true -force >FIPS mode enabled. >ssl.sh: #1269: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED >modutil -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server -list >ssl.sh: #1270: (modutil -list) produced a returncode of 0, expected is 0 - PASSED > 1. NSS Internal FIPS PKCS #11 Module >ssl.sh: #1271: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED >ssl.sh: Turning FIPS on for the extended server >modutil -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_server -fips true -force >FIPS mode enabled. >ssl.sh: #1272: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED >modutil -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_server -list >ssl.sh: #1273: (modutil -list) produced a returncode of 0, expected is 0 - PASSED > 1. NSS Internal FIPS PKCS #11 Module >ssl.sh: #1274: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED >ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== >selfserv_9218 starting at Wed Mar 6 17:14:26 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:27 MST 2013 >selfserv_9218 with PID 3801 started at Wed Mar 6 17:14:27 MST 2013 >ssl.sh: skipping SSL2_RC4_128_WITH_MD5 (non-FIPS only) >ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only) >ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only) >ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only) >ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only) >ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only) >ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only) >ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only) >ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only) >ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1275: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1276: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1277: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) >ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) >ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1278: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1279: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1280: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) >ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) >ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1281: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1282: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1283: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1284: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1285: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1286: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1287: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) >ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) >ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1288: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1289: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1290: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) >ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) >ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1291: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1292: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1293: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1294: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1295: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1296: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1297: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping f TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) >ssl.sh: skipping g TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) >ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1298: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1299: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1300: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) >ssl.sh: skipping TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) >ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1301: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1302: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1303: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- >kill -0 3801 >/dev/null 2>/dev/null >selfserv_9218 with PID 3801 found at Wed Mar 6 17:14:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1304: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >trying to kill selfserv_9218 with PID 3801 at Wed Mar 6 17:14:29 MST 2013 >kill -USR1 3801 >selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 3801 killed at Wed Mar 6 17:14:29 MST 2013 >ssl.sh: SSL Client Authentication - server fips/client normal =============================== >ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:29 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 5121 >/dev/null 2>/dev/null >selfserv_9218 with PID 5121 found at Wed Mar 6 17:14:30 MST 2013 >selfserv_9218 with PID 5121 started at Wed Mar 6 17:14:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1305: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 5121 at Wed Mar 6 17:14:30 MST 2013 >kill -USR1 5121 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 5121 killed at Wed Mar 6 17:14:30 MST 2013 >ssl.sh: TLS Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:30 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 5178 >/dev/null 2>/dev/null >selfserv_9218 with PID 5178 found at Wed Mar 6 17:14:31 MST 2013 >selfserv_9218 with PID 5178 started at Wed Mar 6 17:14:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1306: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 5178 at Wed Mar 6 17:14:31 MST 2013 >kill -USR1 5178 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 5178 killed at Wed Mar 6 17:14:31 MST 2013 >ssl.sh: TLS Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:31 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 5235 >/dev/null 2>/dev/null >selfserv_9218 with PID 5235 found at Wed Mar 6 17:14:32 MST 2013 >selfserv_9218 with PID 5235 started at Wed Mar 6 17:14:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1307: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 5235 at Wed Mar 6 17:14:32 MST 2013 >kill -USR1 5235 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 5235 killed at Wed Mar 6 17:14:32 MST 2013 >ssl.sh: TLS Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:32 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 5292 >/dev/null 2>/dev/null >selfserv_9218 with PID 5292 found at Wed Mar 6 17:14:33 MST 2013 >selfserv_9218 with PID 5292 started at Wed Mar 6 17:14:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1308: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 5292 at Wed Mar 6 17:14:33 MST 2013 >kill -USR1 5292 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 5292 killed at Wed Mar 6 17:14:34 MST 2013 >ssl.sh: TLS Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:34 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 5349 >/dev/null 2>/dev/null >selfserv_9218 with PID 5349 found at Wed Mar 6 17:14:35 MST 2013 >selfserv_9218 with PID 5349 started at Wed Mar 6 17:14:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1309: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 5349 at Wed Mar 6 17:14:35 MST 2013 >kill -USR1 5349 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 5349 killed at Wed Mar 6 17:14:35 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 5406 >/dev/null 2>/dev/null >selfserv_9218 with PID 5406 found at Wed Mar 6 17:14:36 MST 2013 >selfserv_9218 with PID 5406 started at Wed Mar 6 17:14:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1310: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 5406 at Wed Mar 6 17:14:36 MST 2013 >kill -USR1 5406 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 5406 killed at Wed Mar 6 17:14:36 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:36 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 5463 >/dev/null 2>/dev/null >selfserv_9218 with PID 5463 found at Wed Mar 6 17:14:37 MST 2013 >selfserv_9218 with PID 5463 started at Wed Mar 6 17:14:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1311: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 5463 at Wed Mar 6 17:14:37 MST 2013 >kill -USR1 5463 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 5463 killed at Wed Mar 6 17:14:37 MST 2013 >ssl.sh: SSL3 Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 5520 >/dev/null 2>/dev/null >selfserv_9218 with PID 5520 found at Wed Mar 6 17:14:37 MST 2013 >selfserv_9218 with PID 5520 started at Wed Mar 6 17:14:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1312: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 5520 at Wed Mar 6 17:14:37 MST 2013 >kill -USR1 5520 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 5520 killed at Wed Mar 6 17:14:37 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 5577 >/dev/null 2>/dev/null >selfserv_9218 with PID 5577 found at Wed Mar 6 17:14:37 MST 2013 >selfserv_9218 with PID 5577 started at Wed Mar 6 17:14:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1313: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 5577 at Wed Mar 6 17:14:37 MST 2013 >kill -USR1 5577 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 5577 killed at Wed Mar 6 17:14:37 MST 2013 >ssl.sh: SSL3 Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 5634 >/dev/null 2>/dev/null >selfserv_9218 with PID 5634 found at Wed Mar 6 17:14:37 MST 2013 >selfserv_9218 with PID 5634 started at Wed Mar 6 17:14:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1314: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 5634 at Wed Mar 6 17:14:37 MST 2013 >kill -USR1 5634 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 5634 killed at Wed Mar 6 17:14:37 MST 2013 >ssl.sh: SSL3 Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 5691 >/dev/null 2>/dev/null >selfserv_9218 with PID 5691 found at Wed Mar 6 17:14:38 MST 2013 >selfserv_9218 with PID 5691 started at Wed Mar 6 17:14:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1315: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 5691 at Wed Mar 6 17:14:38 MST 2013 >kill -USR1 5691 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 5691 killed at Wed Mar 6 17:14:38 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 5748 >/dev/null 2>/dev/null >selfserv_9218 with PID 5748 found at Wed Mar 6 17:14:38 MST 2013 >selfserv_9218 with PID 5748 started at Wed Mar 6 17:14:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1316: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 5748 at Wed Mar 6 17:14:38 MST 2013 >kill -USR1 5748 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 5748 killed at Wed Mar 6 17:14:38 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 5805 >/dev/null 2>/dev/null >selfserv_9218 with PID 5805 found at Wed Mar 6 17:14:38 MST 2013 >selfserv_9218 with PID 5805 started at Wed Mar 6 17:14:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1317: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 5805 at Wed Mar 6 17:14:38 MST 2013 >kill -USR1 5805 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 5805 killed at Wed Mar 6 17:14:38 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 5862 >/dev/null 2>/dev/null >selfserv_9218 with PID 5862 found at Wed Mar 6 17:14:38 MST 2013 >selfserv_9218 with PID 5862 started at Wed Mar 6 17:14:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1318: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 5862 at Wed Mar 6 17:14:38 MST 2013 >kill -USR1 5862 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 5862 killed at Wed Mar 6 17:14:38 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 5919 >/dev/null 2>/dev/null >selfserv_9218 with PID 5919 found at Wed Mar 6 17:14:38 MST 2013 >selfserv_9218 with PID 5919 started at Wed Mar 6 17:14:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1319: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 5919 at Wed Mar 6 17:14:39 MST 2013 >kill -USR1 5919 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 5919 killed at Wed Mar 6 17:14:39 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 5976 >/dev/null 2>/dev/null >selfserv_9218 with PID 5976 found at Wed Mar 6 17:14:39 MST 2013 >selfserv_9218 with PID 5976 started at Wed Mar 6 17:14:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1320: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 5976 at Wed Mar 6 17:14:39 MST 2013 >kill -USR1 5976 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 5976 killed at Wed Mar 6 17:14:39 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 6033 >/dev/null 2>/dev/null >selfserv_9218 with PID 6033 found at Wed Mar 6 17:14:39 MST 2013 >selfserv_9218 with PID 6033 started at Wed Mar 6 17:14:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1321: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 6033 at Wed Mar 6 17:14:39 MST 2013 >kill -USR1 6033 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 6033 killed at Wed Mar 6 17:14:39 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 6090 >/dev/null 2>/dev/null >selfserv_9218 with PID 6090 found at Wed Mar 6 17:14:39 MST 2013 >selfserv_9218 with PID 6090 started at Wed Mar 6 17:14:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1322: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 6090 at Wed Mar 6 17:14:39 MST 2013 >kill -USR1 6090 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 6090 killed at Wed Mar 6 17:14:39 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 6147 >/dev/null 2>/dev/null >selfserv_9218 with PID 6147 found at Wed Mar 6 17:14:39 MST 2013 >selfserv_9218 with PID 6147 started at Wed Mar 6 17:14:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1323: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 6147 at Wed Mar 6 17:14:39 MST 2013 >kill -USR1 6147 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 6147 killed at Wed Mar 6 17:14:39 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 6204 >/dev/null 2>/dev/null >selfserv_9218 with PID 6204 found at Wed Mar 6 17:14:40 MST 2013 >selfserv_9218 with PID 6204 started at Wed Mar 6 17:14:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1324: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 6204 at Wed Mar 6 17:14:40 MST 2013 >kill -USR1 6204 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 6204 killed at Wed Mar 6 17:14:40 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 6261 >/dev/null 2>/dev/null >selfserv_9218 with PID 6261 found at Wed Mar 6 17:14:40 MST 2013 >selfserv_9218 with PID 6261 started at Wed Mar 6 17:14:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1325: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 6261 at Wed Mar 6 17:14:40 MST 2013 >kill -USR1 6261 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 6261 killed at Wed Mar 6 17:14:40 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 6318 >/dev/null 2>/dev/null >selfserv_9218 with PID 6318 found at Wed Mar 6 17:14:40 MST 2013 >selfserv_9218 with PID 6318 started at Wed Mar 6 17:14:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1326: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 6318 at Wed Mar 6 17:14:40 MST 2013 >kill -USR1 6318 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 6318 killed at Wed Mar 6 17:14:40 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 6375 >/dev/null 2>/dev/null >selfserv_9218 with PID 6375 found at Wed Mar 6 17:14:40 MST 2013 >selfserv_9218 with PID 6375 started at Wed Mar 6 17:14:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1327: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 6375 at Wed Mar 6 17:14:40 MST 2013 >kill -USR1 6375 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 6375 killed at Wed Mar 6 17:14:40 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 6432 >/dev/null 2>/dev/null >selfserv_9218 with PID 6432 found at Wed Mar 6 17:14:40 MST 2013 >selfserv_9218 with PID 6432 started at Wed Mar 6 17:14:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1328: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 6432 at Wed Mar 6 17:14:41 MST 2013 >kill -USR1 6432 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 6432 killed at Wed Mar 6 17:14:41 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 6489 >/dev/null 2>/dev/null >selfserv_9218 with PID 6489 found at Wed Mar 6 17:14:41 MST 2013 >selfserv_9218 with PID 6489 started at Wed Mar 6 17:14:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1329: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 6489 at Wed Mar 6 17:14:41 MST 2013 >kill -USR1 6489 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 6489 killed at Wed Mar 6 17:14:41 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 6546 >/dev/null 2>/dev/null >selfserv_9218 with PID 6546 found at Wed Mar 6 17:14:41 MST 2013 >selfserv_9218 with PID 6546 started at Wed Mar 6 17:14:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1330: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 6546 at Wed Mar 6 17:14:41 MST 2013 >kill -USR1 6546 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 6546 killed at Wed Mar 6 17:14:41 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 6603 >/dev/null 2>/dev/null >selfserv_9218 with PID 6603 found at Wed Mar 6 17:14:41 MST 2013 >selfserv_9218 with PID 6603 started at Wed Mar 6 17:14:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1331: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 6603 at Wed Mar 6 17:14:41 MST 2013 >kill -USR1 6603 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 6603 killed at Wed Mar 6 17:14:41 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 6660 >/dev/null 2>/dev/null >selfserv_9218 with PID 6660 found at Wed Mar 6 17:14:41 MST 2013 >selfserv_9218 with PID 6660 started at Wed Mar 6 17:14:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1332: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 6660 at Wed Mar 6 17:14:41 MST 2013 >kill -USR1 6660 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 6660 killed at Wed Mar 6 17:14:41 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:14:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 6717 >/dev/null 2>/dev/null >selfserv_9218 with PID 6717 found at Wed Mar 6 17:14:42 MST 2013 >selfserv_9218 with PID 6717 started at Wed Mar 6 17:14:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1333: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 6717 at Wed Mar 6 17:14:42 MST 2013 >kill -USR1 6717 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 6717 killed at Wed Mar 6 17:14:42 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 6774 >/dev/null 2>/dev/null >selfserv_9218 with PID 6774 found at Wed Mar 6 17:14:42 MST 2013 >selfserv_9218 with PID 6774 started at Wed Mar 6 17:14:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1334: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 6774 at Wed Mar 6 17:14:42 MST 2013 >kill -USR1 6774 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 6774 killed at Wed Mar 6 17:14:42 MST 2013 >ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: TLS Server hello response without SNI ---- >selfserv_9218 starting at Wed Mar 6 17:14:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 6907 >/dev/null 2>/dev/null >selfserv_9218 with PID 6907 found at Wed Mar 6 17:14:42 MST 2013 >selfserv_9218 with PID 6907 started at Wed Mar 6 17:14:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1335: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 6907 at Wed Mar 6 17:14:42 MST 2013 >kill -USR1 6907 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 6907 killed at Wed Mar 6 17:14:42 MST 2013 >ssl.sh: TLS Server hello response with SNI ---- >selfserv_9218 starting at Wed Mar 6 17:14:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 6970 >/dev/null 2>/dev/null >selfserv_9218 with PID 6970 found at Wed Mar 6 17:14:42 MST 2013 >selfserv_9218 with PID 6970 started at Wed Mar 6 17:14:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1336: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 6970 at Wed Mar 6 17:14:42 MST 2013 >kill -USR1 6970 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 6970 killed at Wed Mar 6 17:14:42 MST 2013 >ssl.sh: TLS Server response with alert ---- >selfserv_9218 starting at Wed Mar 6 17:14:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 7033 >/dev/null 2>/dev/null >selfserv_9218 with PID 7033 found at Wed Mar 6 17:14:43 MST 2013 >selfserv_9218 with PID 7033 started at Wed Mar 6 17:14:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. >tstclnt: exiting with return code 254 >ssl.sh: #1337: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 7033 at Wed Mar 6 17:14:43 MST 2013 >kill -USR1 7033 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 7033 killed at Wed Mar 6 17:14:43 MST 2013 >ssl.sh: SSL3 Server hello response without SNI ---- >selfserv_9218 starting at Wed Mar 6 17:14:43 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 7096 >/dev/null 2>/dev/null >selfserv_9218 with PID 7096 found at Wed Mar 6 17:14:43 MST 2013 >selfserv_9218 with PID 7096 started at Wed Mar 6 17:14:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1338: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 7096 at Wed Mar 6 17:14:43 MST 2013 >kill -USR1 7096 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 7096 killed at Wed Mar 6 17:14:43 MST 2013 >ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- >selfserv_9218 starting at Wed Mar 6 17:14:43 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 7159 >/dev/null 2>/dev/null >selfserv_9218 with PID 7159 found at Wed Mar 6 17:14:43 MST 2013 >selfserv_9218 with PID 7159 started at Wed Mar 6 17:14:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12271: >SSL peer cannot verify your certificate. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1339: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 7159 at Wed Mar 6 17:14:43 MST 2013 >kill -USR1 7159 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 7159 killed at Wed Mar 6 17:14:43 MST 2013 >ssl.sh: TLS Server hello response without SNI ---- >selfserv_9218 starting at Wed Mar 6 17:14:43 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 7222 >/dev/null 2>/dev/null >selfserv_9218 with PID 7222 found at Wed Mar 6 17:14:43 MST 2013 >selfserv_9218 with PID 7222 started at Wed Mar 6 17:14:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1340: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 7222 at Wed Mar 6 17:14:43 MST 2013 >kill -USR1 7222 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 7222 killed at Wed Mar 6 17:14:43 MST 2013 >ssl.sh: TLS Server hello response with SNI ---- >selfserv_9218 starting at Wed Mar 6 17:14:43 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 7285 >/dev/null 2>/dev/null >selfserv_9218 with PID 7285 found at Wed Mar 6 17:14:43 MST 2013 >selfserv_9218 with PID 7285 started at Wed Mar 6 17:14:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1341: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 7285 at Wed Mar 6 17:14:44 MST 2013 >kill -USR1 7285 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 7285 killed at Wed Mar 6 17:14:44 MST 2013 >ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- >selfserv_9218 starting at Wed Mar 6 17:14:44 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 7348 >/dev/null 2>/dev/null >selfserv_9218 with PID 7348 found at Wed Mar 6 17:14:44 MST 2013 >selfserv_9218 with PID 7348 started at Wed Mar 6 17:14:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). >tstclnt: exiting with return code 1 >ssl.sh: #1342: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 7348 at Wed Mar 6 17:14:44 MST 2013 >kill -USR1 7348 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 7348 killed at Wed Mar 6 17:14:44 MST 2013 >ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- >selfserv_9218 starting at Wed Mar 6 17:14:44 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 7411 >/dev/null 2>/dev/null >selfserv_9218 with PID 7411 found at Wed Mar 6 17:14:44 MST 2013 >selfserv_9218 with PID 7411 started at Wed Mar 6 17:14:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. >tstclnt: exiting with return code 1 >ssl.sh: #1343: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 7411 at Wed Mar 6 17:14:44 MST 2013 >kill -USR1 7411 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 7411 killed at Wed Mar 6 17:14:44 MST 2013 >ssl.sh: TLS Server response with alert ---- >selfserv_9218 starting at Wed Mar 6 17:14:44 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 7474 >/dev/null 2>/dev/null >selfserv_9218 with PID 7474 found at Wed Mar 6 17:14:44 MST 2013 >selfserv_9218 with PID 7474 started at Wed Mar 6 17:14:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. >tstclnt: exiting with return code 254 >ssl.sh: #1344: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 7474 at Wed Mar 6 17:14:44 MST 2013 >kill -USR1 7474 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 7474 killed at Wed Mar 6 17:14:44 MST 2013 >ssl.sh: SSL Stress Test - server fips/client normal =============================== >ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (non-FIPS only) >ssl.sh: Stress SSL3 RC4 128 with MD5 ---- >selfserv_9218 starting at Wed Mar 6 17:14:44 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 7610 >/dev/null 2>/dev/null >selfserv_9218 with PID 7610 found at Wed Mar 6 17:14:44 MST 2013 >selfserv_9218 with PID 7610 started at Wed Mar 6 17:14:44 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -c 1000 -C c -V :ssl3 \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:44 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:14:45 MST 2013 >ssl.sh: #1345: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 7610 at Wed Mar 6 17:14:45 MST 2013 >kill -USR1 7610 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 7610 killed at Wed Mar 6 17:14:45 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 ---- >selfserv_9218 starting at Wed Mar 6 17:14:45 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 7686 >/dev/null 2>/dev/null >selfserv_9218 with PID 7686 found at Wed Mar 6 17:14:45 MST 2013 >selfserv_9218 with PID 7686 started at Wed Mar 6 17:14:45 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -c 1000 -C c \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:45 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:14:45 MST 2013 >ssl.sh: #1346: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 7686 at Wed Mar 6 17:14:45 MST 2013 >kill -USR1 7686 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 7686 killed at Wed Mar 6 17:14:45 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- >selfserv_9218 starting at Wed Mar 6 17:14:45 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 7762 >/dev/null 2>/dev/null >selfserv_9218 with PID 7762 found at Wed Mar 6 17:14:45 MST 2013 >selfserv_9218 with PID 7762 started at Wed Mar 6 17:14:45 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -c 1000 -C c -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:45 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:14:45 MST 2013 >ssl.sh: #1347: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 7762 at Wed Mar 6 17:14:46 MST 2013 >kill -USR1 7762 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 7762 killed at Wed Mar 6 17:14:46 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- >selfserv_9218 starting at Wed Mar 6 17:14:46 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -u -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 7838 >/dev/null 2>/dev/null >selfserv_9218 with PID 7838 found at Wed Mar 6 17:14:46 MST 2013 >selfserv_9218 with PID 7838 started at Wed Mar 6 17:14:46 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 1000 -C c -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:46 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:14:46 MST 2013 >ssl.sh: #1348: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 7838 at Wed Mar 6 17:14:46 MST 2013 >kill -USR1 7838 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 7838 killed at Wed Mar 6 17:14:46 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- >selfserv_9218 starting at Wed Mar 6 17:14:46 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 7914 >/dev/null 2>/dev/null >selfserv_9218 with PID 7914 found at Wed Mar 6 17:14:46 MST 2013 >selfserv_9218 with PID 7914 started at Wed Mar 6 17:14:46 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 1000 -C c -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:46 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:14:46 MST 2013 >ssl.sh: #1349: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 7914 at Wed Mar 6 17:14:46 MST 2013 >kill -USR1 7914 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 7914 killed at Wed Mar 6 17:14:46 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- >selfserv_9218 starting at Wed Mar 6 17:14:46 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 7990 >/dev/null 2>/dev/null >selfserv_9218 with PID 7990 found at Wed Mar 6 17:14:47 MST 2013 >selfserv_9218 with PID 7990 started at Wed Mar 6 17:14:47 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:47 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:14:47 MST 2013 >ssl.sh: #1350: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 7990 at Wed Mar 6 17:14:47 MST 2013 >kill -USR1 7990 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 7990 killed at Wed Mar 6 17:14:47 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:14:47 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 8066 >/dev/null 2>/dev/null >selfserv_9218 with PID 8066 found at Wed Mar 6 17:14:47 MST 2013 >selfserv_9218 with PID 8066 started at Wed Mar 6 17:14:47 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:47 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:14:47 MST 2013 >ssl.sh: #1351: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 8066 at Wed Mar 6 17:14:47 MST 2013 >kill -USR1 8066 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 8066 killed at Wed Mar 6 17:14:47 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- >selfserv_9218 starting at Wed Mar 6 17:14:47 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -u -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 8148 >/dev/null 2>/dev/null >selfserv_9218 with PID 8148 found at Wed Mar 6 17:14:48 MST 2013 >selfserv_9218 with PID 8148 started at Wed Mar 6 17:14:48 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:48 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:14:49 MST 2013 >ssl.sh: #1352: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 8148 at Wed Mar 6 17:14:49 MST 2013 >kill -USR1 8148 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 8148 killed at Wed Mar 6 17:14:49 MST 2013 >ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only) >ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:49 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:49 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 8249 >/dev/null 2>/dev/null >selfserv_9218 with PID 8249 found at Wed Mar 6 17:14:50 MST 2013 >selfserv_9218 with PID 8249 started at Wed Mar 6 17:14:50 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -c 100 -C c -V :ssl3 -N -n TestUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:50 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:14:50 MST 2013 >ssl.sh: #1353: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 8249 at Wed Mar 6 17:14:50 MST 2013 >kill -USR1 8249 >selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 8249 killed at Wed Mar 6 17:14:50 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:50 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:50 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 8324 >/dev/null 2>/dev/null >selfserv_9218 with PID 8324 found at Wed Mar 6 17:14:51 MST 2013 >selfserv_9218 with PID 8324 started at Wed Mar 6 17:14:51 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -c 100 -C c -N -n TestUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:51 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:14:51 MST 2013 >ssl.sh: #1354: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 8324 at Wed Mar 6 17:14:51 MST 2013 >kill -USR1 8324 >selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 8324 killed at Wed Mar 6 17:14:51 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:51 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -u -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:51 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 8399 >/dev/null 2>/dev/null >selfserv_9218 with PID 8399 found at Wed Mar 6 17:14:52 MST 2013 >selfserv_9218 with PID 8399 started at Wed Mar 6 17:14:52 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:52 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:14:52 MST 2013 >ssl.sh: #1355: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 8399 at Wed Mar 6 17:14:52 MST 2013 >kill -USR1 8399 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 8399 killed at Wed Mar 6 17:14:52 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:52 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:52 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 8475 >/dev/null 2>/dev/null >selfserv_9218 with PID 8475 found at Wed Mar 6 17:14:53 MST 2013 >selfserv_9218 with PID 8475 started at Wed Mar 6 17:14:53 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:53 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:14:53 MST 2013 >ssl.sh: #1356: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 8475 at Wed Mar 6 17:14:53 MST 2013 >kill -USR1 8475 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 8475 killed at Wed Mar 6 17:14:53 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:14:53 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:53 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 8551 >/dev/null 2>/dev/null >selfserv_9218 with PID 8551 found at Wed Mar 6 17:14:54 MST 2013 >selfserv_9218 with PID 8551 started at Wed Mar 6 17:14:54 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:54 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:14:54 MST 2013 >ssl.sh: #1357: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 8551 at Wed Mar 6 17:14:54 MST 2013 >kill -USR1 8551 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 8551 killed at Wed Mar 6 17:14:55 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:14:55 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:55 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 8627 >/dev/null 2>/dev/null >selfserv_9218 with PID 8627 found at Wed Mar 6 17:14:56 MST 2013 >selfserv_9218 with PID 8627 started at Wed Mar 6 17:14:56 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:56 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:14:56 MST 2013 >ssl.sh: #1358: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 8627 at Wed Mar 6 17:14:56 MST 2013 >kill -USR1 8627 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 8627 killed at Wed Mar 6 17:14:56 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:14:56 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:56 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 8703 >/dev/null 2>/dev/null >selfserv_9218 with PID 8703 found at Wed Mar 6 17:14:57 MST 2013 >selfserv_9218 with PID 8703 started at Wed Mar 6 17:14:57 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:57 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:14:57 MST 2013 >ssl.sh: #1359: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 8703 at Wed Mar 6 17:14:57 MST 2013 >kill -USR1 8703 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 8703 killed at Wed Mar 6 17:14:57 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- >selfserv_9218 starting at Wed Mar 6 17:14:57 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:57 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 8785 >/dev/null 2>/dev/null >selfserv_9218 with PID 8785 found at Wed Mar 6 17:14:58 MST 2013 >selfserv_9218 with PID 8785 started at Wed Mar 6 17:14:58 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:58 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:14:58 MST 2013 >ssl.sh: #1360: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 8785 at Wed Mar 6 17:14:58 MST 2013 >kill -USR1 8785 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 8785 killed at Wed Mar 6 17:14:58 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- >selfserv_9218 starting at Wed Mar 6 17:14:58 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:14:58 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 8867 >/dev/null 2>/dev/null >selfserv_9218 with PID 8867 found at Wed Mar 6 17:14:59 MST 2013 >selfserv_9218 with PID 8867 started at Wed Mar 6 17:14:59 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:14:59 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:14:59 MST 2013 >ssl.sh: #1361: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 8867 at Wed Mar 6 17:14:59 MST 2013 >kill -USR1 8867 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 8867 killed at Wed Mar 6 17:14:59 MST 2013 >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) >ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== >selfserv_9218 starting at Wed Mar 6 17:15:00 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:00 MST 2013 >selfserv_9218 with PID 9020 started at Wed Mar 6 17:15:00 MST 2013 >ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test >ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1362: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1363: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1364: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) >ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) >ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1365: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1366: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1367: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) >ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) >ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1368: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1369: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1370: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1371: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1372: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1373: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1374: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) >ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) >ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1375: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1376: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1377: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) >ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) >ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1378: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1379: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1380: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1381: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1382: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1383: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1384: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping f TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) >ssl.sh: skipping g TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) >ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1385: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1386: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1387: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) >ssl.sh: skipping TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) >ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1388: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1389: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1390: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- >kill -0 9020 >/dev/null 2>/dev/null >selfserv_9218 with PID 9020 found at Wed Mar 6 17:15:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1391: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >trying to kill selfserv_9218 with PID 9020 at Wed Mar 6 17:15:01 MST 2013 >kill -USR1 9020 >selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 9020 killed at Wed Mar 6 17:15:01 MST 2013 >ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== >ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:01 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 10337 >/dev/null 2>/dev/null >selfserv_9218 with PID 10337 found at Wed Mar 6 17:15:02 MST 2013 >selfserv_9218 with PID 10337 started at Wed Mar 6 17:15:02 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1392: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 10337 at Wed Mar 6 17:15:02 MST 2013 >kill -USR1 10337 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 10337 killed at Wed Mar 6 17:15:02 MST 2013 >ssl.sh: TLS Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:15:02 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:02 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 10394 >/dev/null 2>/dev/null >selfserv_9218 with PID 10394 found at Wed Mar 6 17:15:02 MST 2013 >selfserv_9218 with PID 10394 started at Wed Mar 6 17:15:02 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1393: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 10394 at Wed Mar 6 17:15:02 MST 2013 >kill -USR1 10394 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 10394 killed at Wed Mar 6 17:15:02 MST 2013 >ssl.sh: TLS Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:02 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:02 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 10451 >/dev/null 2>/dev/null >selfserv_9218 with PID 10451 found at Wed Mar 6 17:15:02 MST 2013 >selfserv_9218 with PID 10451 started at Wed Mar 6 17:15:02 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1394: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 10451 at Wed Mar 6 17:15:02 MST 2013 >kill -USR1 10451 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 10451 killed at Wed Mar 6 17:15:02 MST 2013 >ssl.sh: TLS Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:02 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:02 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 10508 >/dev/null 2>/dev/null >selfserv_9218 with PID 10508 found at Wed Mar 6 17:15:02 MST 2013 >selfserv_9218 with PID 10508 started at Wed Mar 6 17:15:02 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1395: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 10508 at Wed Mar 6 17:15:02 MST 2013 >kill -USR1 10508 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 10508 killed at Wed Mar 6 17:15:02 MST 2013 >ssl.sh: TLS Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:15:02 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:02 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 10565 >/dev/null 2>/dev/null >selfserv_9218 with PID 10565 found at Wed Mar 6 17:15:02 MST 2013 >selfserv_9218 with PID 10565 started at Wed Mar 6 17:15:02 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1396: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 10565 at Wed Mar 6 17:15:03 MST 2013 >kill -USR1 10565 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 10565 killed at Wed Mar 6 17:15:03 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:03 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 10622 >/dev/null 2>/dev/null >selfserv_9218 with PID 10622 found at Wed Mar 6 17:15:03 MST 2013 >selfserv_9218 with PID 10622 started at Wed Mar 6 17:15:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1397: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 10622 at Wed Mar 6 17:15:03 MST 2013 >kill -USR1 10622 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 10622 killed at Wed Mar 6 17:15:03 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:03 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 10679 >/dev/null 2>/dev/null >selfserv_9218 with PID 10679 found at Wed Mar 6 17:15:03 MST 2013 >selfserv_9218 with PID 10679 started at Wed Mar 6 17:15:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1398: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 10679 at Wed Mar 6 17:15:03 MST 2013 >kill -USR1 10679 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 10679 killed at Wed Mar 6 17:15:03 MST 2013 >ssl.sh: SSL3 Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:15:03 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 10736 >/dev/null 2>/dev/null >selfserv_9218 with PID 10736 found at Wed Mar 6 17:15:03 MST 2013 >selfserv_9218 with PID 10736 started at Wed Mar 6 17:15:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1399: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 10736 at Wed Mar 6 17:15:03 MST 2013 >kill -USR1 10736 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 10736 killed at Wed Mar 6 17:15:03 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:03 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 10793 >/dev/null 2>/dev/null >selfserv_9218 with PID 10793 found at Wed Mar 6 17:15:03 MST 2013 >selfserv_9218 with PID 10793 started at Wed Mar 6 17:15:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1400: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 10793 at Wed Mar 6 17:15:03 MST 2013 >kill -USR1 10793 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 10793 killed at Wed Mar 6 17:15:03 MST 2013 >ssl.sh: SSL3 Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:04 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 10850 >/dev/null 2>/dev/null >selfserv_9218 with PID 10850 found at Wed Mar 6 17:15:04 MST 2013 >selfserv_9218 with PID 10850 started at Wed Mar 6 17:15:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1401: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 10850 at Wed Mar 6 17:15:04 MST 2013 >kill -USR1 10850 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 10850 killed at Wed Mar 6 17:15:04 MST 2013 >ssl.sh: SSL3 Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:15:04 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 10907 >/dev/null 2>/dev/null >selfserv_9218 with PID 10907 found at Wed Mar 6 17:15:04 MST 2013 >selfserv_9218 with PID 10907 started at Wed Mar 6 17:15:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1402: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 10907 at Wed Mar 6 17:15:04 MST 2013 >kill -USR1 10907 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 10907 killed at Wed Mar 6 17:15:04 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:04 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 10964 >/dev/null 2>/dev/null >selfserv_9218 with PID 10964 found at Wed Mar 6 17:15:04 MST 2013 >selfserv_9218 with PID 10964 started at Wed Mar 6 17:15:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1403: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 10964 at Wed Mar 6 17:15:04 MST 2013 >kill -USR1 10964 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 10964 killed at Wed Mar 6 17:15:04 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:04 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 11021 >/dev/null 2>/dev/null >selfserv_9218 with PID 11021 found at Wed Mar 6 17:15:04 MST 2013 >selfserv_9218 with PID 11021 started at Wed Mar 6 17:15:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1404: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 11021 at Wed Mar 6 17:15:04 MST 2013 >kill -USR1 11021 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 11021 killed at Wed Mar 6 17:15:04 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:15:04 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 11078 >/dev/null 2>/dev/null >selfserv_9218 with PID 11078 found at Wed Mar 6 17:15:05 MST 2013 >selfserv_9218 with PID 11078 started at Wed Mar 6 17:15:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1405: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 11078 at Wed Mar 6 17:15:05 MST 2013 >kill -USR1 11078 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 11078 killed at Wed Mar 6 17:15:05 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:05 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 11135 >/dev/null 2>/dev/null >selfserv_9218 with PID 11135 found at Wed Mar 6 17:15:05 MST 2013 >selfserv_9218 with PID 11135 started at Wed Mar 6 17:15:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1406: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 11135 at Wed Mar 6 17:15:05 MST 2013 >kill -USR1 11135 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 11135 killed at Wed Mar 6 17:15:05 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:05 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 11192 >/dev/null 2>/dev/null >selfserv_9218 with PID 11192 found at Wed Mar 6 17:15:05 MST 2013 >selfserv_9218 with PID 11192 started at Wed Mar 6 17:15:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1407: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 11192 at Wed Mar 6 17:15:05 MST 2013 >kill -USR1 11192 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 11192 killed at Wed Mar 6 17:15:05 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:15:05 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 11249 >/dev/null 2>/dev/null >selfserv_9218 with PID 11249 found at Wed Mar 6 17:15:05 MST 2013 >selfserv_9218 with PID 11249 started at Wed Mar 6 17:15:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1408: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 11249 at Wed Mar 6 17:15:05 MST 2013 >kill -USR1 11249 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 11249 killed at Wed Mar 6 17:15:05 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:05 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 11306 >/dev/null 2>/dev/null >selfserv_9218 with PID 11306 found at Wed Mar 6 17:15:05 MST 2013 >selfserv_9218 with PID 11306 started at Wed Mar 6 17:15:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1409: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 11306 at Wed Mar 6 17:15:06 MST 2013 >kill -USR1 11306 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 11306 killed at Wed Mar 6 17:15:06 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:06 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 11363 >/dev/null 2>/dev/null >selfserv_9218 with PID 11363 found at Wed Mar 6 17:15:06 MST 2013 >selfserv_9218 with PID 11363 started at Wed Mar 6 17:15:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1410: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 11363 at Wed Mar 6 17:15:06 MST 2013 >kill -USR1 11363 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 11363 killed at Wed Mar 6 17:15:06 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:15:06 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 11420 >/dev/null 2>/dev/null >selfserv_9218 with PID 11420 found at Wed Mar 6 17:15:06 MST 2013 >selfserv_9218 with PID 11420 started at Wed Mar 6 17:15:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1411: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 11420 at Wed Mar 6 17:15:06 MST 2013 >kill -USR1 11420 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 11420 killed at Wed Mar 6 17:15:06 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:06 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 11477 >/dev/null 2>/dev/null >selfserv_9218 with PID 11477 found at Wed Mar 6 17:15:06 MST 2013 >selfserv_9218 with PID 11477 started at Wed Mar 6 17:15:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1412: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 11477 at Wed Mar 6 17:15:06 MST 2013 >kill -USR1 11477 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 11477 killed at Wed Mar 6 17:15:06 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:06 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 11534 >/dev/null 2>/dev/null >selfserv_9218 with PID 11534 found at Wed Mar 6 17:15:06 MST 2013 >selfserv_9218 with PID 11534 started at Wed Mar 6 17:15:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1413: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 11534 at Wed Mar 6 17:15:06 MST 2013 >kill -USR1 11534 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 11534 killed at Wed Mar 6 17:15:06 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:15:06 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 11591 >/dev/null 2>/dev/null >selfserv_9218 with PID 11591 found at Wed Mar 6 17:15:07 MST 2013 >selfserv_9218 with PID 11591 started at Wed Mar 6 17:15:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1414: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 11591 at Wed Mar 6 17:15:07 MST 2013 >kill -USR1 11591 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 11591 killed at Wed Mar 6 17:15:07 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:07 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 11648 >/dev/null 2>/dev/null >selfserv_9218 with PID 11648 found at Wed Mar 6 17:15:07 MST 2013 >selfserv_9218 with PID 11648 started at Wed Mar 6 17:15:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1415: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 11648 at Wed Mar 6 17:15:07 MST 2013 >kill -USR1 11648 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 11648 killed at Wed Mar 6 17:15:07 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:07 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 11705 >/dev/null 2>/dev/null >selfserv_9218 with PID 11705 found at Wed Mar 6 17:15:07 MST 2013 >selfserv_9218 with PID 11705 started at Wed Mar 6 17:15:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1416: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 11705 at Wed Mar 6 17:15:07 MST 2013 >kill -USR1 11705 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 11705 killed at Wed Mar 6 17:15:07 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:15:07 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 11762 >/dev/null 2>/dev/null >selfserv_9218 with PID 11762 found at Wed Mar 6 17:15:07 MST 2013 >selfserv_9218 with PID 11762 started at Wed Mar 6 17:15:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1417: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 11762 at Wed Mar 6 17:15:07 MST 2013 >kill -USR1 11762 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 11762 killed at Wed Mar 6 17:15:07 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:07 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 11819 >/dev/null 2>/dev/null >selfserv_9218 with PID 11819 found at Wed Mar 6 17:15:07 MST 2013 >selfserv_9218 with PID 11819 started at Wed Mar 6 17:15:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1418: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 11819 at Wed Mar 6 17:15:08 MST 2013 >kill -USR1 11819 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 11819 killed at Wed Mar 6 17:15:08 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 11876 >/dev/null 2>/dev/null >selfserv_9218 with PID 11876 found at Wed Mar 6 17:15:08 MST 2013 >selfserv_9218 with PID 11876 started at Wed Mar 6 17:15:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1419: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 11876 at Wed Mar 6 17:15:08 MST 2013 >kill -USR1 11876 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 11876 killed at Wed Mar 6 17:15:08 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:15:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 11933 >/dev/null 2>/dev/null >selfserv_9218 with PID 11933 found at Wed Mar 6 17:15:08 MST 2013 >selfserv_9218 with PID 11933 started at Wed Mar 6 17:15:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1420: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 11933 at Wed Mar 6 17:15:08 MST 2013 >kill -USR1 11933 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 11933 killed at Wed Mar 6 17:15:08 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 11990 >/dev/null 2>/dev/null >selfserv_9218 with PID 11990 found at Wed Mar 6 17:15:08 MST 2013 >selfserv_9218 with PID 11990 started at Wed Mar 6 17:15:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1421: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 11990 at Wed Mar 6 17:15:08 MST 2013 >kill -USR1 11990 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 11990 killed at Wed Mar 6 17:15:08 MST 2013 >ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Server hello response without SNI for Extended Test >ssl.sh: skipping TLS Server hello response with SNI for Extended Test >ssl.sh: skipping TLS Server response with alert for Extended Test >ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test >ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test >ssl.sh: skipping TLS Server hello response without SNI for Extended Test >ssl.sh: skipping TLS Server hello response with SNI for Extended Test >ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test >ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test >ssl.sh: skipping TLS Server response with alert for Extended Test >ssl.sh: SSL Stress Test Extended Test - server fips/client normal =============================== >ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test >ssl.sh: Stress SSL3 RC4 128 with MD5 ---- >selfserv_9218 starting at Wed Mar 6 17:15:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 12216 >/dev/null 2>/dev/null >selfserv_9218 with PID 12216 found at Wed Mar 6 17:15:09 MST 2013 >selfserv_9218 with PID 12216 started at Wed Mar 6 17:15:09 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -c 1000 -C c -V :ssl3 \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:09 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:15:09 MST 2013 >ssl.sh: #1422: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 12216 at Wed Mar 6 17:15:09 MST 2013 >kill -USR1 12216 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 12216 killed at Wed Mar 6 17:15:09 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 ---- >selfserv_9218 starting at Wed Mar 6 17:15:09 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 12292 >/dev/null 2>/dev/null >selfserv_9218 with PID 12292 found at Wed Mar 6 17:15:09 MST 2013 >selfserv_9218 with PID 12292 started at Wed Mar 6 17:15:09 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -c 1000 -C c \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:09 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:15:09 MST 2013 >ssl.sh: #1423: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 12292 at Wed Mar 6 17:15:09 MST 2013 >kill -USR1 12292 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 12292 killed at Wed Mar 6 17:15:09 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- >selfserv_9218 starting at Wed Mar 6 17:15:09 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 12368 >/dev/null 2>/dev/null >selfserv_9218 with PID 12368 found at Wed Mar 6 17:15:09 MST 2013 >selfserv_9218 with PID 12368 started at Wed Mar 6 17:15:09 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -c 1000 -C c -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:09 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:15:10 MST 2013 >ssl.sh: #1424: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 12368 at Wed Mar 6 17:15:10 MST 2013 >kill -USR1 12368 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 12368 killed at Wed Mar 6 17:15:10 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- >selfserv_9218 starting at Wed Mar 6 17:15:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -u -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 12444 >/dev/null 2>/dev/null >selfserv_9218 with PID 12444 found at Wed Mar 6 17:15:10 MST 2013 >selfserv_9218 with PID 12444 started at Wed Mar 6 17:15:10 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:10 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:15:10 MST 2013 >ssl.sh: #1425: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 12444 at Wed Mar 6 17:15:10 MST 2013 >kill -USR1 12444 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 12444 killed at Wed Mar 6 17:15:10 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- >selfserv_9218 starting at Wed Mar 6 17:15:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 12520 >/dev/null 2>/dev/null >selfserv_9218 with PID 12520 found at Wed Mar 6 17:15:10 MST 2013 >selfserv_9218 with PID 12520 started at Wed Mar 6 17:15:10 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:10 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:15:10 MST 2013 >ssl.sh: #1426: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 12520 at Wed Mar 6 17:15:10 MST 2013 >kill -USR1 12520 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 12520 killed at Wed Mar 6 17:15:10 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- >selfserv_9218 starting at Wed Mar 6 17:15:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 12596 >/dev/null 2>/dev/null >selfserv_9218 with PID 12596 found at Wed Mar 6 17:15:11 MST 2013 >selfserv_9218 with PID 12596 started at Wed Mar 6 17:15:11 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:11 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:15:12 MST 2013 >ssl.sh: #1427: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 12596 at Wed Mar 6 17:15:12 MST 2013 >kill -USR1 12596 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 12596 killed at Wed Mar 6 17:15:12 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:15:12 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 12672 >/dev/null 2>/dev/null >selfserv_9218 with PID 12672 found at Wed Mar 6 17:15:13 MST 2013 >selfserv_9218 with PID 12672 started at Wed Mar 6 17:15:13 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:13 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:15:13 MST 2013 >ssl.sh: #1428: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 12672 at Wed Mar 6 17:15:13 MST 2013 >kill -USR1 12672 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 12672 killed at Wed Mar 6 17:15:13 MST 2013 >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test >ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test >ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:13 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 12785 >/dev/null 2>/dev/null >selfserv_9218 with PID 12785 found at Wed Mar 6 17:15:14 MST 2013 >selfserv_9218 with PID 12785 started at Wed Mar 6 17:15:14 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:14 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:15:14 MST 2013 >ssl.sh: #1429: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 12785 at Wed Mar 6 17:15:14 MST 2013 >kill -USR1 12785 >selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 12785 killed at Wed Mar 6 17:15:14 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:15 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 12860 >/dev/null 2>/dev/null >selfserv_9218 with PID 12860 found at Wed Mar 6 17:15:16 MST 2013 >selfserv_9218 with PID 12860 started at Wed Mar 6 17:15:16 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:16 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:15:16 MST 2013 >ssl.sh: #1430: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 12860 at Wed Mar 6 17:15:16 MST 2013 >kill -USR1 12860 >selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 12860 killed at Wed Mar 6 17:15:16 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:16 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -u -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 12935 >/dev/null 2>/dev/null >selfserv_9218 with PID 12935 found at Wed Mar 6 17:15:16 MST 2013 >selfserv_9218 with PID 12935 started at Wed Mar 6 17:15:16 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:16 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:15:16 MST 2013 >ssl.sh: #1431: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 12935 at Wed Mar 6 17:15:16 MST 2013 >kill -USR1 12935 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 12935 killed at Wed Mar 6 17:15:16 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:16 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 13011 >/dev/null 2>/dev/null >selfserv_9218 with PID 13011 found at Wed Mar 6 17:15:17 MST 2013 >selfserv_9218 with PID 13011 started at Wed Mar 6 17:15:17 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:17 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:15:17 MST 2013 >ssl.sh: #1432: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 13011 at Wed Mar 6 17:15:17 MST 2013 >kill -USR1 13011 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 13011 killed at Wed Mar 6 17:15:17 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:15:17 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:17 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 13087 >/dev/null 2>/dev/null >selfserv_9218 with PID 13087 found at Wed Mar 6 17:15:18 MST 2013 >selfserv_9218 with PID 13087 started at Wed Mar 6 17:15:18 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:18 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:15:18 MST 2013 >ssl.sh: #1433: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 13087 at Wed Mar 6 17:15:18 MST 2013 >kill -USR1 13087 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 13087 killed at Wed Mar 6 17:15:18 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:18 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 13163 >/dev/null 2>/dev/null >selfserv_9218 with PID 13163 found at Wed Mar 6 17:15:19 MST 2013 >selfserv_9218 with PID 13163 started at Wed Mar 6 17:15:19 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:19 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:15:19 MST 2013 >ssl.sh: #1434: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 13163 at Wed Mar 6 17:15:19 MST 2013 >kill -USR1 13163 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 13163 killed at Wed Mar 6 17:15:19 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:15:20 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 13239 >/dev/null 2>/dev/null >selfserv_9218 with PID 13239 found at Wed Mar 6 17:15:21 MST 2013 >selfserv_9218 with PID 13239 started at Wed Mar 6 17:15:21 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:21 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:15:21 MST 2013 >ssl.sh: #1435: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 13239 at Wed Mar 6 17:15:21 MST 2013 >kill -USR1 13239 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 13239 killed at Wed Mar 6 17:15:21 MST 2013 >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) >ssl.sh: SSL - FIPS mode off for server =============================== >ssl.sh: Turning FIPS off for the server >modutil -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server -fips false -force >FIPS mode disabled. >ssl.sh: #1436: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED >modutil -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/server -list >ssl.sh: #1437: (modutil -list) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: #1438: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED >ssl.sh: Turning FIPS off for the extended server >modutil -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_server -fips false -force >FIPS mode disabled. >ssl.sh: #1439: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED >modutil -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_server -list >ssl.sh: #1440: (modutil -list) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: #1441: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED >ssl.sh: SSL - FIPS mode on for client =============================== >ssl.sh: Turning FIPS on for the client >modutil -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -fips true -force >FIPS mode enabled. >ssl.sh: #1442: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED >modutil -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -list >ssl.sh: #1443: (modutil -list) produced a returncode of 0, expected is 0 - PASSED > 1. NSS Internal FIPS PKCS #11 Module >ssl.sh: #1444: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED >ssl.sh: Turning FIPS on for the extended client >modutil -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_client -fips true -force >FIPS mode enabled. >ssl.sh: #1445: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED >modutil -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_client -list >ssl.sh: #1446: (modutil -list) produced a returncode of 0, expected is 0 - PASSED > 1. NSS Internal FIPS PKCS #11 Module >ssl.sh: #1447: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED >ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== >selfserv_9218 starting at Wed Mar 6 17:15:21 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:22 MST 2013 >selfserv_9218 with PID 13530 started at Wed Mar 6 17:15:22 MST 2013 >ssl.sh: skipping SSL2_RC4_128_WITH_MD5 (non-FIPS only) >ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only) >ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only) >ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only) >ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only) >ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only) >ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only) >ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only) >ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only) >ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1448: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1449: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1450: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) >ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) >ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1451: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1452: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1453: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) >ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) >ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1454: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1455: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1456: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:ssl3 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1457: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1458: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1459: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1460: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) >ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) >ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1461: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1462: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1463: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) >ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) >ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1464: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1465: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1466: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.0 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1467: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1468: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1469: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1470: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping f TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) >ssl.sh: skipping g TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) >ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1471: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1472: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1473: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) >ssl.sh: skipping TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) >ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1474: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1475: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1476: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- >kill -0 13530 >/dev/null 2>/dev/null >selfserv_9218 with PID 13530 found at Wed Mar 6 17:15:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.1 \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1477: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >trying to kill selfserv_9218 with PID 13530 at Wed Mar 6 17:15:26 MST 2013 >kill -USR1 13530 >selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 13530 killed at Wed Mar 6 17:15:26 MST 2013 >ssl.sh: SSL Client Authentication - server normal/client fips =============================== >ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) >ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) >ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) >ssl.sh: TLS Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:26 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 14848 >/dev/null 2>/dev/null >selfserv_9218 with PID 14848 found at Wed Mar 6 17:15:26 MST 2013 >selfserv_9218 with PID 14848 started at Wed Mar 6 17:15:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1478: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 14848 at Wed Mar 6 17:15:26 MST 2013 >kill -USR1 14848 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 14848 killed at Wed Mar 6 17:15:26 MST 2013 >ssl.sh: TLS Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:15:26 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 14905 >/dev/null 2>/dev/null >selfserv_9218 with PID 14905 found at Wed Mar 6 17:15:26 MST 2013 >selfserv_9218 with PID 14905 started at Wed Mar 6 17:15:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12271: >SSL peer cannot verify your certificate. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >Incorrect password/PIN entered. >tstclnt: authentication of server cert failed: Peer's certificate has an invalid signature. >tstclnt: exiting with return code 254 >ssl.sh: #1479: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 14905 at Wed Mar 6 17:15:28 MST 2013 >kill -USR1 14905 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 14905 killed at Wed Mar 6 17:15:28 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:28 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 14962 >/dev/null 2>/dev/null >selfserv_9218 with PID 14962 found at Wed Mar 6 17:15:28 MST 2013 >selfserv_9218 with PID 14962 started at Wed Mar 6 17:15:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1480: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 14962 at Wed Mar 6 17:15:28 MST 2013 >kill -USR1 14962 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 14962 killed at Wed Mar 6 17:15:28 MST 2013 >ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) >ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) >ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) >ssl.sh: SSL3 Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:28 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 15025 >/dev/null 2>/dev/null >selfserv_9218 with PID 15025 found at Wed Mar 6 17:15:29 MST 2013 >selfserv_9218 with PID 15025 started at Wed Mar 6 17:15:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1481: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 15025 at Wed Mar 6 17:15:29 MST 2013 >kill -USR1 15025 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 15025 killed at Wed Mar 6 17:15:29 MST 2013 >ssl.sh: SSL3 Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:15:29 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 15082 >/dev/null 2>/dev/null >selfserv_9218 with PID 15082 found at Wed Mar 6 17:15:29 MST 2013 >selfserv_9218 with PID 15082 started at Wed Mar 6 17:15:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >Incorrect password/PIN entered. >Incorrect password/PIN entered. >tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation. >tstclnt: exiting with return code 254 >ssl.sh: #1482: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 15082 at Wed Mar 6 17:15:32 MST 2013 >kill -USR1 15082 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 15082 killed at Wed Mar 6 17:15:32 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:32 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 15139 >/dev/null 2>/dev/null >selfserv_9218 with PID 15139 found at Wed Mar 6 17:15:32 MST 2013 >selfserv_9218 with PID 15139 started at Wed Mar 6 17:15:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1483: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 15139 at Wed Mar 6 17:15:32 MST 2013 >kill -USR1 15139 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 15139 killed at Wed Mar 6 17:15:32 MST 2013 >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) >ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:32 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 15202 >/dev/null 2>/dev/null >selfserv_9218 with PID 15202 found at Wed Mar 6 17:15:32 MST 2013 >selfserv_9218 with PID 15202 started at Wed Mar 6 17:15:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1484: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 15202 at Wed Mar 6 17:15:33 MST 2013 >kill -USR1 15202 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 15202 killed at Wed Mar 6 17:15:33 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:15:33 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 15259 >/dev/null 2>/dev/null >selfserv_9218 with PID 15259 found at Wed Mar 6 17:15:33 MST 2013 >selfserv_9218 with PID 15259 started at Wed Mar 6 17:15:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >Incorrect password/PIN entered. >tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation. >tstclnt: exiting with return code 254 >ssl.sh: #1485: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 15259 at Wed Mar 6 17:15:35 MST 2013 >kill -USR1 15259 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 15259 killed at Wed Mar 6 17:15:35 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 15316 >/dev/null 2>/dev/null >selfserv_9218 with PID 15316 found at Wed Mar 6 17:15:35 MST 2013 >selfserv_9218 with PID 15316 started at Wed Mar 6 17:15:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1486: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 15316 at Wed Mar 6 17:15:35 MST 2013 >kill -USR1 15316 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 15316 killed at Wed Mar 6 17:15:35 MST 2013 >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 15379 >/dev/null 2>/dev/null >selfserv_9218 with PID 15379 found at Wed Mar 6 17:15:35 MST 2013 >selfserv_9218 with PID 15379 started at Wed Mar 6 17:15:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1487: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 15379 at Wed Mar 6 17:15:35 MST 2013 >kill -USR1 15379 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 15379 killed at Wed Mar 6 17:15:35 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:15:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 15436 >/dev/null 2>/dev/null >selfserv_9218 with PID 15436 found at Wed Mar 6 17:15:35 MST 2013 >selfserv_9218 with PID 15436 started at Wed Mar 6 17:15:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >Incorrect password/PIN entered. >tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation. >tstclnt: exiting with return code 254 >ssl.sh: #1488: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 15436 at Wed Mar 6 17:15:38 MST 2013 >kill -USR1 15436 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 15436 killed at Wed Mar 6 17:15:38 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 15493 >/dev/null 2>/dev/null >selfserv_9218 with PID 15493 found at Wed Mar 6 17:15:38 MST 2013 >selfserv_9218 with PID 15493 started at Wed Mar 6 17:15:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1489: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 15493 at Wed Mar 6 17:15:38 MST 2013 >kill -USR1 15493 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 15493 killed at Wed Mar 6 17:15:38 MST 2013 >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) >ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 15556 >/dev/null 2>/dev/null >selfserv_9218 with PID 15556 found at Wed Mar 6 17:15:38 MST 2013 >selfserv_9218 with PID 15556 started at Wed Mar 6 17:15:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1490: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 15556 at Wed Mar 6 17:15:38 MST 2013 >kill -USR1 15556 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 15556 killed at Wed Mar 6 17:15:38 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:15:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 15613 >/dev/null 2>/dev/null >selfserv_9218 with PID 15613 found at Wed Mar 6 17:15:38 MST 2013 >selfserv_9218 with PID 15613 started at Wed Mar 6 17:15:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >Incorrect password/PIN entered. >tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation. >tstclnt: exiting with return code 254 >ssl.sh: #1491: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 15613 at Wed Mar 6 17:15:40 MST 2013 >kill -USR1 15613 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 15613 killed at Wed Mar 6 17:15:40 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 15670 >/dev/null 2>/dev/null >selfserv_9218 with PID 15670 found at Wed Mar 6 17:15:41 MST 2013 >selfserv_9218 with PID 15670 started at Wed Mar 6 17:15:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1492: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 15670 at Wed Mar 6 17:15:41 MST 2013 >kill -USR1 15670 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 15670 killed at Wed Mar 6 17:15:41 MST 2013 >ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) >ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) >ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) >ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: TLS Server hello response without SNI ---- >selfserv_9218 starting at Wed Mar 6 17:15:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 15803 >/dev/null 2>/dev/null >selfserv_9218 with PID 15803 found at Wed Mar 6 17:15:41 MST 2013 >selfserv_9218 with PID 15803 started at Wed Mar 6 17:15:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1493: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 15803 at Wed Mar 6 17:15:41 MST 2013 >kill -USR1 15803 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 15803 killed at Wed Mar 6 17:15:41 MST 2013 >ssl.sh: TLS Server hello response with SNI ---- >selfserv_9218 starting at Wed Mar 6 17:15:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 15866 >/dev/null 2>/dev/null >selfserv_9218 with PID 15866 found at Wed Mar 6 17:15:41 MST 2013 >selfserv_9218 with PID 15866 started at Wed Mar 6 17:15:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1494: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 15866 at Wed Mar 6 17:15:41 MST 2013 >kill -USR1 15866 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 15866 killed at Wed Mar 6 17:15:41 MST 2013 >ssl.sh: TLS Server response with alert ---- >selfserv_9218 starting at Wed Mar 6 17:15:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 15929 >/dev/null 2>/dev/null >selfserv_9218 with PID 15929 found at Wed Mar 6 17:15:41 MST 2013 >selfserv_9218 with PID 15929 started at Wed Mar 6 17:15:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. >tstclnt: exiting with return code 254 >ssl.sh: #1495: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 15929 at Wed Mar 6 17:15:42 MST 2013 >kill -USR1 15929 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 15929 killed at Wed Mar 6 17:15:42 MST 2013 >ssl.sh: SSL3 Server hello response without SNI ---- >selfserv_9218 starting at Wed Mar 6 17:15:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 15992 >/dev/null 2>/dev/null >selfserv_9218 with PID 15992 found at Wed Mar 6 17:15:42 MST 2013 >selfserv_9218 with PID 15992 started at Wed Mar 6 17:15:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1496: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 15992 at Wed Mar 6 17:15:42 MST 2013 >kill -USR1 15992 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 15992 killed at Wed Mar 6 17:15:42 MST 2013 >ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- >selfserv_9218 starting at Wed Mar 6 17:15:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 16055 >/dev/null 2>/dev/null >selfserv_9218 with PID 16055 found at Wed Mar 6 17:15:42 MST 2013 >selfserv_9218 with PID 16055 started at Wed Mar 6 17:15:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12271: >SSL peer cannot verify your certificate. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1497: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 16055 at Wed Mar 6 17:15:42 MST 2013 >kill -USR1 16055 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 16055 killed at Wed Mar 6 17:15:42 MST 2013 >ssl.sh: TLS Server hello response without SNI ---- >selfserv_9218 starting at Wed Mar 6 17:15:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 16118 >/dev/null 2>/dev/null >selfserv_9218 with PID 16118 found at Wed Mar 6 17:15:42 MST 2013 >selfserv_9218 with PID 16118 started at Wed Mar 6 17:15:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1498: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 16118 at Wed Mar 6 17:15:42 MST 2013 >kill -USR1 16118 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 16118 killed at Wed Mar 6 17:15:42 MST 2013 >ssl.sh: TLS Server hello response with SNI ---- >selfserv_9218 starting at Wed Mar 6 17:15:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 16181 >/dev/null 2>/dev/null >selfserv_9218 with PID 16181 found at Wed Mar 6 17:15:43 MST 2013 >selfserv_9218 with PID 16181 started at Wed Mar 6 17:15:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1499: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 16181 at Wed Mar 6 17:15:43 MST 2013 >kill -USR1 16181 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 16181 killed at Wed Mar 6 17:15:43 MST 2013 >ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- >selfserv_9218 starting at Wed Mar 6 17:15:43 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 16244 >/dev/null 2>/dev/null >selfserv_9218 with PID 16244 found at Wed Mar 6 17:15:43 MST 2013 >selfserv_9218 with PID 16244 started at Wed Mar 6 17:15:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). >tstclnt: exiting with return code 1 >ssl.sh: #1500: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 16244 at Wed Mar 6 17:15:43 MST 2013 >kill -USR1 16244 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 16244 killed at Wed Mar 6 17:15:43 MST 2013 >ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- >selfserv_9218 starting at Wed Mar 6 17:15:43 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 16307 >/dev/null 2>/dev/null >selfserv_9218 with PID 16307 found at Wed Mar 6 17:15:43 MST 2013 >selfserv_9218 with PID 16307 started at Wed Mar 6 17:15:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. >tstclnt: exiting with return code 1 >ssl.sh: #1501: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 16307 at Wed Mar 6 17:15:43 MST 2013 >kill -USR1 16307 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 16307 killed at Wed Mar 6 17:15:43 MST 2013 >ssl.sh: TLS Server response with alert ---- >selfserv_9218 starting at Wed Mar 6 17:15:43 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 16370 >/dev/null 2>/dev/null >selfserv_9218 with PID 16370 found at Wed Mar 6 17:15:43 MST 2013 >selfserv_9218 with PID 16370 started at Wed Mar 6 17:15:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. >tstclnt: exiting with return code 254 >ssl.sh: #1502: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 16370 at Wed Mar 6 17:15:43 MST 2013 >kill -USR1 16370 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 16370 killed at Wed Mar 6 17:15:43 MST 2013 >ssl.sh: SSL Stress Test - server normal/client fips =============================== >ssl.sh: skipping Form is subject to the terms of the Mozilla Public (non-FIPS only) >ssl.sh: skipping If a copy of the MPL was not distributed with this (non-FIPS only) >ssl.sh: skipping obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only) >ssl.sh: skipping (non-FIPS only) >ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only) >ssl.sh: skipping (non-FIPS only) >ssl.sh: skipping (non-FIPS only) >ssl.sh: skipping client Test Case name (non-FIPS only) >ssl.sh: skipping params (non-FIPS only) >ssl.sh: skipping ------ --------------- (non-FIPS only) >ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (non-FIPS only) >ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only) >ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only) >ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only) >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only) >ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only) >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only) >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only) >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) (non-FIPS only) >ssl.sh: skipping (non-FIPS only) >ssl.sh: skipping versions here... (non-FIPS only) >ssl.sh: skipping (non-FIPS only) >ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only) >ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:44 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 16524 >/dev/null 2>/dev/null >selfserv_9218 with PID 16524 found at Wed Mar 6 17:15:44 MST 2013 >selfserv_9218 with PID 16524 started at Wed Mar 6 17:15:44 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -c 100 -C c -V :ssl3 -N -n TestUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:44 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:15:44 MST 2013 >ssl.sh: #1503: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 16524 at Wed Mar 6 17:15:44 MST 2013 >kill -USR1 16524 >selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 16524 killed at Wed Mar 6 17:15:44 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:44 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 16599 >/dev/null 2>/dev/null >selfserv_9218 with PID 16599 found at Wed Mar 6 17:15:44 MST 2013 >selfserv_9218 with PID 16599 started at Wed Mar 6 17:15:44 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -c 100 -C c -N -n TestUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:44 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:15:44 MST 2013 >ssl.sh: #1504: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 16599 at Wed Mar 6 17:15:44 MST 2013 >kill -USR1 16599 >selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 16599 killed at Wed Mar 6 17:15:45 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:45 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -u -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 16674 >/dev/null 2>/dev/null >selfserv_9218 with PID 16674 found at Wed Mar 6 17:15:45 MST 2013 >selfserv_9218 with PID 16674 started at Wed Mar 6 17:15:45 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:45 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:15:45 MST 2013 >ssl.sh: #1505: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 16674 at Wed Mar 6 17:15:45 MST 2013 >kill -USR1 16674 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 16674 killed at Wed Mar 6 17:15:45 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:45 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 16750 >/dev/null 2>/dev/null >selfserv_9218 with PID 16750 found at Wed Mar 6 17:15:45 MST 2013 >selfserv_9218 with PID 16750 started at Wed Mar 6 17:15:45 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:45 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:15:45 MST 2013 >ssl.sh: #1506: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 16750 at Wed Mar 6 17:15:45 MST 2013 >kill -USR1 16750 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 16750 killed at Wed Mar 6 17:15:45 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:15:45 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 16826 >/dev/null 2>/dev/null >selfserv_9218 with PID 16826 found at Wed Mar 6 17:15:45 MST 2013 >selfserv_9218 with PID 16826 started at Wed Mar 6 17:15:45 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:45 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:15:45 MST 2013 >ssl.sh: #1507: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 16826 at Wed Mar 6 17:15:45 MST 2013 >kill -USR1 16826 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 16826 killed at Wed Mar 6 17:15:45 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:45 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 16902 >/dev/null 2>/dev/null >selfserv_9218 with PID 16902 found at Wed Mar 6 17:15:46 MST 2013 >selfserv_9218 with PID 16902 started at Wed Mar 6 17:15:46 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:46 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:15:46 MST 2013 >ssl.sh: #1508: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 16902 at Wed Mar 6 17:15:46 MST 2013 >kill -USR1 16902 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 16902 killed at Wed Mar 6 17:15:46 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:15:46 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 16978 >/dev/null 2>/dev/null >selfserv_9218 with PID 16978 found at Wed Mar 6 17:15:46 MST 2013 >selfserv_9218 with PID 16978 started at Wed Mar 6 17:15:46 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:46 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:15:46 MST 2013 >ssl.sh: #1509: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 16978 at Wed Mar 6 17:15:46 MST 2013 >kill -USR1 16978 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 16978 killed at Wed Mar 6 17:15:46 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- >selfserv_9218 starting at Wed Mar 6 17:15:46 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 17060 >/dev/null 2>/dev/null >selfserv_9218 with PID 17060 found at Wed Mar 6 17:15:46 MST 2013 >selfserv_9218 with PID 17060 started at Wed Mar 6 17:15:46 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:46 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:15:47 MST 2013 >ssl.sh: #1510: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 17060 at Wed Mar 6 17:15:47 MST 2013 >kill -USR1 17060 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 17060 killed at Wed Mar 6 17:15:47 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- >selfserv_9218 starting at Wed Mar 6 17:15:47 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 17144 >/dev/null 2>/dev/null >selfserv_9218 with PID 17144 found at Wed Mar 6 17:15:47 MST 2013 >selfserv_9218 with PID 17144 started at Wed Mar 6 17:15:47 MST 2013 >strsclnt -q -p 9218 -d ../client -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:15:47 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:15:47 MST 2013 >ssl.sh: #1511: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 17144 at Wed Mar 6 17:15:47 MST 2013 >kill -USR1 17144 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 17144 killed at Wed Mar 6 17:15:47 MST 2013 >ssl.sh: skipping (non-FIPS only) >ssl.sh: skipping ############################ (non-FIPS only) >ssl.sh: skipping (non-FIPS only) >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) >ssl.sh: skipping (non-FIPS only) >ssl.sh: skipping versions here... (non-FIPS only) >ssl.sh: skipping (non-FIPS only) >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) >ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== >selfserv_9218 starting at Wed Mar 6 17:15:47 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:47 MST 2013 >selfserv_9218 with PID 17281 started at Wed Mar 6 17:15:47 MST 2013 >ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test >ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1512: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1513: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1514: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) >ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) >ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1515: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1516: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1517: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) >ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) >ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1518: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1519: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1520: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:49 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:ssl3 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1521: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:49 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1522: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:49 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1523: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:49 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1524: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) >ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) >ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:49 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1525: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:49 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1526: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:49 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1527: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) >ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) >ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:49 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1528: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:50 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1529: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:50 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1530: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:50 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.0 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1531: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:50 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1532: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:50 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1533: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:50 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1534: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping f TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) >ssl.sh: skipping g TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) >ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:50 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1535: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:50 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1536: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:51 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1537: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) >ssl.sh: skipping TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) >ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:51 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1538: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:51 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1539: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:51 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1540: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- >kill -0 17281 >/dev/null 2>/dev/null >selfserv_9218 with PID 17281 found at Wed Mar 6 17:15:51 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.1 \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1541: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >trying to kill selfserv_9218 with PID 17281 at Wed Mar 6 17:15:51 MST 2013 >kill -USR1 17281 >selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 17281 killed at Wed Mar 6 17:15:51 MST 2013 >ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== >ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) >ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) >ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) >ssl.sh: TLS Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:51 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:51 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 18599 >/dev/null 2>/dev/null >selfserv_9218 with PID 18599 found at Wed Mar 6 17:15:52 MST 2013 >selfserv_9218 with PID 18599 started at Wed Mar 6 17:15:52 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1542: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 18599 at Wed Mar 6 17:15:52 MST 2013 >kill -USR1 18599 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 18599 killed at Wed Mar 6 17:15:52 MST 2013 >ssl.sh: TLS Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:15:52 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:52 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 18656 >/dev/null 2>/dev/null >selfserv_9218 with PID 18656 found at Wed Mar 6 17:15:52 MST 2013 >selfserv_9218 with PID 18656 started at Wed Mar 6 17:15:52 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12271: >SSL peer cannot verify your certificate. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >Incorrect password/PIN entered. >tstclnt: authentication of server cert failed: Peer's certificate has an invalid signature. >tstclnt: exiting with return code 254 >ssl.sh: #1543: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 18656 at Wed Mar 6 17:15:54 MST 2013 >kill -USR1 18656 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 18656 killed at Wed Mar 6 17:15:54 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:54 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:54 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 18713 >/dev/null 2>/dev/null >selfserv_9218 with PID 18713 found at Wed Mar 6 17:15:54 MST 2013 >selfserv_9218 with PID 18713 started at Wed Mar 6 17:15:54 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1544: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 18713 at Wed Mar 6 17:15:54 MST 2013 >kill -USR1 18713 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 18713 killed at Wed Mar 6 17:15:54 MST 2013 >ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) >ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) >ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) >ssl.sh: SSL3 Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:54 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:54 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 18776 >/dev/null 2>/dev/null >selfserv_9218 with PID 18776 found at Wed Mar 6 17:15:54 MST 2013 >selfserv_9218 with PID 18776 started at Wed Mar 6 17:15:54 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #1545: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 18776 at Wed Mar 6 17:15:55 MST 2013 >kill -USR1 18776 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 18776 killed at Wed Mar 6 17:15:55 MST 2013 >ssl.sh: SSL3 Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:15:55 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:55 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 18833 >/dev/null 2>/dev/null >selfserv_9218 with PID 18833 found at Wed Mar 6 17:15:55 MST 2013 >selfserv_9218 with PID 18833 started at Wed Mar 6 17:15:55 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >Incorrect password/PIN entered. >Incorrect password/PIN entered. >tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation. >tstclnt: exiting with return code 254 >ssl.sh: #1546: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 18833 at Wed Mar 6 17:15:58 MST 2013 >kill -USR1 18833 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 18833 killed at Wed Mar 6 17:15:58 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:58 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:58 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 18890 >/dev/null 2>/dev/null >selfserv_9218 with PID 18890 found at Wed Mar 6 17:15:58 MST 2013 >selfserv_9218 with PID 18890 started at Wed Mar 6 17:15:58 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1547: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 18890 at Wed Mar 6 17:15:58 MST 2013 >kill -USR1 18890 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 18890 killed at Wed Mar 6 17:15:58 MST 2013 >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) >ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:15:58 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:58 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 18953 >/dev/null 2>/dev/null >selfserv_9218 with PID 18953 found at Wed Mar 6 17:15:58 MST 2013 >selfserv_9218 with PID 18953 started at Wed Mar 6 17:15:58 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1548: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 18953 at Wed Mar 6 17:15:58 MST 2013 >kill -USR1 18953 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 18953 killed at Wed Mar 6 17:15:58 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:15:58 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:15:58 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 19010 >/dev/null 2>/dev/null >selfserv_9218 with PID 19010 found at Wed Mar 6 17:15:58 MST 2013 >selfserv_9218 with PID 19010 started at Wed Mar 6 17:15:59 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >Incorrect password/PIN entered. >tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation. >tstclnt: exiting with return code 254 >ssl.sh: #1549: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 19010 at Wed Mar 6 17:16:01 MST 2013 >kill -USR1 19010 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 19010 killed at Wed Mar 6 17:16:01 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:16:01 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:16:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 19067 >/dev/null 2>/dev/null >selfserv_9218 with PID 19067 found at Wed Mar 6 17:16:01 MST 2013 >selfserv_9218 with PID 19067 started at Wed Mar 6 17:16:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1550: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 19067 at Wed Mar 6 17:16:01 MST 2013 >kill -USR1 19067 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 19067 killed at Wed Mar 6 17:16:01 MST 2013 >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:16:01 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:16:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 19130 >/dev/null 2>/dev/null >selfserv_9218 with PID 19130 found at Wed Mar 6 17:16:01 MST 2013 >selfserv_9218 with PID 19130 started at Wed Mar 6 17:16:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1551: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 19130 at Wed Mar 6 17:16:01 MST 2013 >kill -USR1 19130 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 19130 killed at Wed Mar 6 17:16:01 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:16:01 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:16:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 19187 >/dev/null 2>/dev/null >selfserv_9218 with PID 19187 found at Wed Mar 6 17:16:01 MST 2013 >selfserv_9218 with PID 19187 started at Wed Mar 6 17:16:01 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >Incorrect password/PIN entered. >tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation. >tstclnt: exiting with return code 254 >ssl.sh: #1552: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 19187 at Wed Mar 6 17:16:03 MST 2013 >kill -USR1 19187 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 19187 killed at Wed Mar 6 17:16:03 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:16:03 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:16:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 19244 >/dev/null 2>/dev/null >selfserv_9218 with PID 19244 found at Wed Mar 6 17:16:04 MST 2013 >selfserv_9218 with PID 19244 started at Wed Mar 6 17:16:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1553: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 19244 at Wed Mar 6 17:16:04 MST 2013 >kill -USR1 19244 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 19244 killed at Wed Mar 6 17:16:04 MST 2013 >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) >ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:16:04 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:16:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 19307 >/dev/null 2>/dev/null >selfserv_9218 with PID 19307 found at Wed Mar 6 17:16:04 MST 2013 >selfserv_9218 with PID 19307 started at Wed Mar 6 17:16:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #1554: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 19307 at Wed Mar 6 17:16:04 MST 2013 >kill -USR1 19307 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 19307 killed at Wed Mar 6 17:16:04 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:16:04 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:16:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 19364 >/dev/null 2>/dev/null >selfserv_9218 with PID 19364 found at Wed Mar 6 17:16:04 MST 2013 >selfserv_9218 with PID 19364 started at Wed Mar 6 17:16:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >Incorrect password/PIN entered. >tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation. >tstclnt: exiting with return code 254 >ssl.sh: #1555: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 19364 at Wed Mar 6 17:16:06 MST 2013 >kill -USR1 19364 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 19364 killed at Wed Mar 6 17:16:06 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:16:06 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:16:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 19421 >/dev/null 2>/dev/null >selfserv_9218 with PID 19421 found at Wed Mar 6 17:16:06 MST 2013 >selfserv_9218 with PID 19421 started at Wed Mar 6 17:16:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v \ > -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #1556: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 19421 at Wed Mar 6 17:16:07 MST 2013 >kill -USR1 19421 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 19421 killed at Wed Mar 6 17:16:07 MST 2013 >ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) >ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) >ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) >ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Server hello response without SNI for Extended Test >ssl.sh: skipping TLS Server hello response with SNI for Extended Test >ssl.sh: skipping TLS Server response with alert for Extended Test >ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test >ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test >ssl.sh: skipping TLS Server hello response without SNI for Extended Test >ssl.sh: skipping TLS Server hello response with SNI for Extended Test >ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test >ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test >ssl.sh: skipping TLS Server response with alert for Extended Test >ssl.sh: SSL Stress Test Extended Test - server normal/client fips =============================== >ssl.sh: skipping Form is subject to the terms of the Mozilla Public (non-FIPS only) >ssl.sh: skipping If a copy of the MPL was not distributed with this (non-FIPS only) >ssl.sh: skipping obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only) >ssl.sh: skipping (non-FIPS only) >ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only) >ssl.sh: skipping (non-FIPS only) >ssl.sh: skipping (non-FIPS only) >ssl.sh: skipping client Test Case name (non-FIPS only) >ssl.sh: skipping params (non-FIPS only) >ssl.sh: skipping ------ --------------- (non-FIPS only) >ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test >ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only) >ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only) >ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only) >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only) >ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only) >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only) >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only) >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test >ssl.sh: skipping (non-FIPS only) >ssl.sh: skipping versions here... (non-FIPS only) >ssl.sh: skipping (non-FIPS only) >ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test >ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:16:07 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:16:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 19665 >/dev/null 2>/dev/null >selfserv_9218 with PID 19665 found at Wed Mar 6 17:16:07 MST 2013 >selfserv_9218 with PID 19665 started at Wed Mar 6 17:16:07 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:16:07 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:16:07 MST 2013 >ssl.sh: #1557: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 19665 at Wed Mar 6 17:16:07 MST 2013 >kill -USR1 19665 >selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 19665 killed at Wed Mar 6 17:16:07 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:16:07 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:16:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 19740 >/dev/null 2>/dev/null >selfserv_9218 with PID 19740 found at Wed Mar 6 17:16:07 MST 2013 >selfserv_9218 with PID 19740 started at Wed Mar 6 17:16:07 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:16:07 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:16:08 MST 2013 >ssl.sh: #1558: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 19740 at Wed Mar 6 17:16:08 MST 2013 >kill -USR1 19740 >selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 19740 killed at Wed Mar 6 17:16:08 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:16:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -u -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:16:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 19815 >/dev/null 2>/dev/null >selfserv_9218 with PID 19815 found at Wed Mar 6 17:16:08 MST 2013 >selfserv_9218 with PID 19815 started at Wed Mar 6 17:16:08 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:16:08 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:16:08 MST 2013 >ssl.sh: #1559: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 19815 at Wed Mar 6 17:16:08 MST 2013 >kill -USR1 19815 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 19815 killed at Wed Mar 6 17:16:08 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:16:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:16:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 19891 >/dev/null 2>/dev/null >selfserv_9218 with PID 19891 found at Wed Mar 6 17:16:08 MST 2013 >selfserv_9218 with PID 19891 started at Wed Mar 6 17:16:08 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:16:08 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:16:08 MST 2013 >ssl.sh: #1560: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 19891 at Wed Mar 6 17:16:08 MST 2013 >kill -USR1 19891 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 19891 killed at Wed Mar 6 17:16:08 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:16:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:16:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 19967 >/dev/null 2>/dev/null >selfserv_9218 with PID 19967 found at Wed Mar 6 17:16:09 MST 2013 >selfserv_9218 with PID 19967 started at Wed Mar 6 17:16:09 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:16:09 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:16:09 MST 2013 >ssl.sh: #1561: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 19967 at Wed Mar 6 17:16:09 MST 2013 >kill -USR1 19967 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 19967 killed at Wed Mar 6 17:16:09 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:16:09 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:16:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 20043 >/dev/null 2>/dev/null >selfserv_9218 with PID 20043 found at Wed Mar 6 17:16:09 MST 2013 >selfserv_9218 with PID 20043 started at Wed Mar 6 17:16:09 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:16:09 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:16:09 MST 2013 >ssl.sh: #1562: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 20043 at Wed Mar 6 17:16:09 MST 2013 >kill -USR1 20043 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 20043 killed at Wed Mar 6 17:16:09 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:16:09 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:16:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 20119 >/dev/null 2>/dev/null >selfserv_9218 with PID 20119 found at Wed Mar 6 17:16:09 MST 2013 >selfserv_9218 with PID 20119 started at Wed Mar 6 17:16:09 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:16:09 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:16:09 MST 2013 >ssl.sh: #1563: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 20119 at Wed Mar 6 17:16:09 MST 2013 >kill -USR1 20119 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 20119 killed at Wed Mar 6 17:16:09 MST 2013 >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test >ssl.sh: skipping (non-FIPS only) >ssl.sh: skipping ############################ (non-FIPS only) >ssl.sh: skipping (non-FIPS only) >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) >ssl.sh: skipping (non-FIPS only) >ssl.sh: skipping versions here... (non-FIPS only) >ssl.sh: skipping (non-FIPS only) >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) >ssl.sh: SSL - FIPS mode off for client =============================== >ssl.sh: Turning FIPS off for the client >modutil -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -fips false -force >FIPS mode disabled. >ssl.sh: #1564: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED >modutil -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/client -list >ssl.sh: #1565: (modutil -list) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: #1566: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED >ssl.sh: Turning FIPS off for the extended client >modutil -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_client -fips false -force >FIPS mode disabled. >ssl.sh: #1567: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED >modutil -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/ext_client -list >ssl.sh: #1568: (modutil -list) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: #1569: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED >TIMESTAMP ssl END: Wed Mar 6 17:16:10 MST 2013 >Running tests for ocsp >TIMESTAMP ocsp BEGIN: Wed Mar 6 17:16:10 MST 2013 >ocsp.sh: OCSP tests =============================== >TIMESTAMP ocsp END: Wed Mar 6 17:16:10 MST 2013 >Running tests for merge >TIMESTAMP merge BEGIN: Wed Mar 6 17:16:10 MST 2013 >merge.sh: Merge Tests =============================== >merge.sh: Creating an SDR key & Encrypt >sdrtest -d . -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests.v3.17100 -t Test2 -f ../tests.pw >merge.sh: #1570: Creating SDR Key - PASSED >merge.sh: Merging in Key for Existing user >certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw >merge.sh: #1571: Merging Dave - PASSED >merge.sh: Merging in new user >certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw >merge.sh: #1572: Merging server - PASSED >merge.sh: Merging in new chain >certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw >merge.sh: #1573: Merging ext_client - PASSED >merge.sh: Merging in conflicting nicknames 1 >certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw >merge.sh: #1574: Merging conflicting nicknames 1 - PASSED >merge.sh: Merging in conflicting nicknames 1 >certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw >merge.sh: #1575: Merging conflicting nicknames 2 - PASSED >merge.sh: Verify nicknames were deconflicted (Alice #4) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 45 (0x2d) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:12:01 2013 > Not After : Wed Mar 07 00:12:01 2018 > Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain > View,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:67:d7:84:f2:6c:26:5b:2a:41:5c:15:81:d4:5a:e9: > 90:dc:88:52:5b:21:22:a9:82:2c:7f:ad:a8:e1:33:70: > dd:33:13:64:2a:aa:9d:64:9b:83:14:3b:e6:66:fc:df: > 25:c6:60:3a:71:3b:b7:4c:13:da:59:86:ad:ae:20:1b: > ff:e8:e6:9e:b9:98:95:80:ee:d7:0c:ab:fb:47:13:69: > ff:72:16:aa:cb:22:d6:36:21:78:93:91:1f:b1:f0:63: > bf:70:05:ca:a6:e2:fe:40:d5:f4:a2:cf:32:28:ed:9f: > d5:c9:06:c4:2e:d7:50:71:e5:fc:2e:97:32:73:58:c7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 25:14:d9:44:55:f6:44:c5:41:36:51:16:aa:6e:2f:e8: > 18:c9:e2:65:1c:d7:5c:5c:f3:87:a8:79:ef:75:bc:d4: > f7:80:ae:42:05:33:b5:23:cf:6e:0f:35:58:1f:dd:ac: > 05:69:75:11:28:d3:19:69:11:8a:ae:1c:89:0c:eb:f2: > a9:0f:f0:79:51:06:b8:e4:7b:46:6b:b1:ef:18:d9:77: > eb:51:4a:5e:07:8e:f8:c7:1e:e3:00:09:21:31:0f:df: > f2:61:51:3c:f8:b6:89:eb:45:4f:c3:f2:fe:29:27:2f: > 57:c1:49:3b:71:85:78:f5:a8:65:02:23:b1:cd:cb:2a > Fingerprint (MD5): > 76:61:AC:EB:89:36:28:FF:31:BD:56:38:E4:B3:0F:53 > Fingerprint (SHA1): > F2:75:65:1A:5A:57:D7:C4:76:37:FA:22:E9:01:A3:0C:5B:21:7E:2F > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >merge.sh: #1576: Verify nicknames were deconflicted (Alice #4) - PASSED >merge.sh: Verify nicknames were deconflicted (Alice #100) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 46 (0x2e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:12:01 2013 > Not After : Wed Mar 07 00:12:01 2018 > Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain > View,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d2:81:a6:fb:02:97:65:98:cb:d9:0c:0b:40:8e:5d:83: > aa:ce:5d:82:8e:77:93:1f:ea:d8:c4:a2:55:13:93:6c: > 65:6d:12:19:b5:c9:d4:ae:52:0c:48:56:3f:72:cd:0c: > bb:b4:dd:0b:5f:83:a9:20:59:6f:40:fa:82:56:95:80: > 02:81:19:b6:fa:a2:fe:c9:7d:6a:7e:4e:50:2f:d1:dd: > 99:33:ff:bf:64:49:42:a2:68:b4:e9:59:39:22:3c:82: > ee:3f:c2:dd:66:a1:20:21:d1:ee:2e:07:ff:82:dd:d0: > e7:e9:6d:41:e7:a1:dd:9e:17:dc:5e:88:8e:60:5d:93 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 97:4e:2e:90:e2:d5:47:af:a3:ec:92:62:eb:09:6b:2f: > 06:dc:3f:f4:4d:1b:42:2e:be:50:48:92:05:a5:80:7a: > 55:b8:01:4f:14:59:dc:07:a9:69:a3:83:80:ee:25:78: > 9b:c7:3d:4c:55:28:f4:6b:ee:3f:7d:4f:f9:3c:9a:44: > 13:19:25:41:68:c5:80:a7:c8:8f:2e:64:48:c0:09:ae: > bf:3e:15:cc:16:d2:a8:76:40:f2:8b:c6:34:72:b2:82: > b3:94:26:ca:bf:41:9b:2e:af:82:60:df:43:7a:10:0f: > e5:dc:a6:f7:67:2f:17:4a:c9:ce:9b:d9:b4:47:08:96 > Fingerprint (MD5): > AF:A2:E1:E2:E9:0E:DB:F4:20:0D:7E:B2:FE:52:C8:40 > Fingerprint (SHA1): > 53:8A:96:EC:2A:3A:D7:65:D2:EA:CB:6A:E5:FC:A9:CD:CA:6A:D3:A1 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >merge.sh: #1577: Verify nicknames were deconflicted (Alice #100) - PASSED >merge.sh: Merging in SDR >certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw >merge.sh: #1578: Merging SDR - PASSED >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >Alice u,u,u >bob@bogus.com ,, >eve@bogus.com ,, >Dave u,u,u >localhost.localdomain u,u,u >clientCA T,C,C >chain-2-clientCA ,, >Alice #1 ,, >Alice #3 ,, >Alice #100 ,, >TestCA CT,C,C >localhost-sni.localdomain u,u,u >ExtendedSSLUser u,u,u >serverCA C,C,C >chain-1-clientCA ,, >Alice #2 ,, >Alice #99 ,, >Alice #4 ,, >CRL names CRL Type >TestCA CRL >merge.sh: Decrypt - With Original SDR Key >sdrtest -d . -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests.v3.17100 -t Test2 -f ../tests.pw >merge.sh: #1579: Decrypt - Value 3 - PASSED >merge.sh: Decrypt - With Merged SDR Key >sdrtest -d . -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests.v1.17100 -t Test1 -f ../tests.pw >merge.sh: #1580: Decrypt - Value 1 - PASSED >merge.sh: Signing with merged key ------------------ >cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig >merge.sh: #1581: Create Detached Signature Dave . - PASSED >cmsutil -D -i dave.dsig -c alice.txt -d . >Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) >From: alice@bogus.com >Subject: message Alice --> Bob >To: bob@bogus.com >This is a test message from Alice to Bob. >merge.sh: #1582: Verifying Dave's Detached Signature - PASSED >merge.sh: verifying merged cert ------------------ >certutil -V -n ExtendedSSLUser -u C -d . >certutil: certificate is valid >merge.sh: #1583: Verifying ExtendedSSL User Cert - PASSED >merge.sh: verifying merged crl ------------------ >crlutil -L -n TestCA -d . >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" > This Update: Thu Mar 07 00:12:07 2013 > Entry 1 (0x1): > Serial Number: 42 (0x2a) > Revocation Date: Thu Mar 07 00:12:05 2013 > Entry 2 (0x2): > Serial Number: 40 (0x28) > Revocation Date: Thu Mar 07 00:11:50 2013 > Entry Extensions: > Name: CRL reason code > CRL Extensions: > Name: Certificate Issuer Alt Name > RFC822 Name: "caemail@ca.com" > DNS name: "ca.com" > Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo > rnia,C=US" > URI: "http://ca.com" > IP Address: > 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 >merge.sh: #1584: Verifying TestCA CRL - PASSED >TIMESTAMP merge END: Wed Mar 6 17:16:10 MST 2013 >Running tests for pkits >TIMESTAMP pkits BEGIN: Wed Mar 6 17:16:10 MST 2013 >pkits.sh: PKITS data directory not defined, skipping. >TIMESTAMP pkits END: Wed Mar 6 17:16:10 MST 2013 >Running tests for chains >TIMESTAMP chains BEGIN: Wed Mar 6 17:16:10 MST 2013 >httpserv starting at Wed Mar 6 17:16:10 MST 2013 >httpserv -D -p 9228 \ > -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/aiahttp/http_pid.17100 & >trying to connect to httpserv at Wed Mar 6 17:16:10 MST 2013 >tstclnt -p 9228 -h localhost.localdomain -q -v >tstclnt: connecting to localhost.localdomain:9228 (address=::1) >kill -0 20505 >/dev/null 2>/dev/null >httpserv with PID 20505 found at Wed Mar 6 17:16:10 MST 2013 >httpserv with PID 20505 started at Wed Mar 6 17:16:10 MST 2013 >chains.sh: Certificate Chains Tests =============================== >chains.sh: Creating DB ArmyDB >certutil -N -d ArmyDB -f ArmyDB/dbpasswd >chains.sh: #1585: Bridge: Creating DB ArmyDB - PASSED >chains.sh: Creating Root CA Army >certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171611 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #1586: Bridge: Creating Root CA Army - PASSED >chains.sh: Exporting Root CA Army.der >certutil -L -d ArmyDB -r -n Army -o Army.der >chains.sh: #1587: Bridge: Exporting Root CA Army.der - PASSED >chains.sh: Creating DB NavyDB >certutil -N -d NavyDB -f NavyDB/dbpasswd >chains.sh: #1588: Bridge: Creating DB NavyDB - PASSED >chains.sh: Creating Root CA Navy >certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171612 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #1589: Bridge: Creating Root CA Navy - PASSED >chains.sh: Exporting Root CA Navy.der >certutil -L -d NavyDB -r -n Navy -o Navy.der >chains.sh: #1590: Bridge: Exporting Root CA Navy.der - PASSED >chains.sh: Creating DB BridgeDB >certutil -N -d BridgeDB -f BridgeDB/dbpasswd >chains.sh: #1591: Bridge: Creating DB BridgeDB - PASSED >chains.sh: Creating Bridge certifiate request BridgeReq.der >certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1592: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED >chains.sh: Creating certficate BridgeArmy.der signed by Army >certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 306171613 -7 Bridge@Army < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #1593: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED >chains.sh: Importing certificate BridgeArmy.der to BridgeDB database >certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der >chains.sh: #1594: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED >chains.sh: Creating certficate BridgeNavy.der signed by Navy >certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 306171614 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #1595: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED >chains.sh: Importing certificate BridgeNavy.der to BridgeDB database >certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der >chains.sh: #1596: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED >chains.sh: Generating PKCS7 package from BridgeDB database >cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 >chains.sh: #1597: Bridge: Generating PKCS7 package from BridgeDB database - PASSED >chains.sh: Creating DB UserDB >certutil -N -d UserDB -f UserDB/dbpasswd >chains.sh: #1598: Bridge: Creating DB UserDB - PASSED >chains.sh: Creating EE certifiate request UserReq.der >certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1599: Bridge: Creating EE certifiate request UserReq.der - PASSED >chains.sh: Creating certficate UserBridge.der signed by Bridge >certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 306171615 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #1600: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED >chains.sh: Importing certificate UserBridge.der to UserDB database >certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der >chains.sh: #1601: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #1602: Bridge: Creating DB AllDB - PASSED >chains.sh: Importing certificate Army.der to AllDB database >certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der >chains.sh: #1603: Bridge: Importing certificate Army.der to AllDB database - PASSED >chains.sh: Importing certificate Navy.der to AllDB database >certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der >chains.sh: #1604: Bridge: Importing certificate Navy.der to AllDB database - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy >vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171612 (0x123fcedc) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:16:11 2013 > Not After : Wed Mar 07 00:16:11 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > f9:3d:fb:cd:19:e8:c4:dd:b8:2e:ed:e4:03:97:c7:3c: > a3:70:e6:7b:b1:be:db:db:78:18:56:80:e9:2d:32:54: > 35:19:41:29:30:f0:3b:51:1a:85:de:b3:a6:c1:87:1a: > b7:5e:39:fd:af:da:ba:6a:2b:2b:11:0a:e0:df:13:af: > 80:83:ee:2c:26:83:f9:15:9e:70:20:87:be:34:e6:c4: > a3:7c:78:b1:54:1b:90:0a:39:3b:a5:c8:85:3f:b4:31: > 23:2d:8b:8d:a7:a2:d7:28:db:01:41:b4:0a:b1:c5:81: > a0:f9:c6:1b:bf:67:42:bb:cb:fd:de:ee:46:16:7e:99 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 72:0d:1a:63:88:9f:9c:96:2f:c3:8a:35:ae:36:9a:e4: > a7:74:13:dd:c6:81:5c:ad:8b:c7:f0:8b:7c:d5:42:f1: > b5:5c:12:9b:45:e8:33:18:13:02:57:ea:77:77:75:fd: > 64:c2:88:9f:b8:cf:9e:30:7c:ef:dc:e4:2a:4a:10:ab: > d7:61:74:de:15:77:30:31:76:c3:d3:9a:4b:9d:db:e7: > 58:b7:05:d9:6f:aa:8c:8b:1c:d0:ef:20:1b:c9:42:03: > 7f:2e:2a:d1:51:38:df:b7:e7:ed:f5:57:72:56:72:c8: > ef:ae:2a:63:ff:b4:f6:51:84:a9:23:b2:dd:e3:2f:73 > Fingerprint (MD5): > 71:03:3B:73:F8:8D:61:24:5D:12:53:B6:C0:3B:84:AC > Fingerprint (SHA1): > 1A:B7:52:BF:CE:9F:B6:46:8D:2B:46:57:F8:4A:C2:68:F7:21:1C:94 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #1605: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army >vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171611 (0x123fcedb) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Army ROOT CA,O=Army,C=US" > Validity: > Not Before: Thu Mar 07 00:16:11 2013 > Not After : Wed Mar 07 00:16:11 2063 > Subject: "CN=Army ROOT CA,O=Army,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d0:a0:26:a6:62:d6:f2:62:f2:2c:26:a6:ba:cb:4c:23: > 4d:18:f8:a7:db:94:4c:64:13:e0:a9:2a:cc:c8:36:37: > bd:eb:5f:d2:1c:b8:3c:e7:86:27:dc:32:07:13:e8:e9: > 13:a9:8a:18:cc:c5:dd:87:e6:82:68:85:3e:65:31:f6: > b0:a1:99:68:8b:bd:86:a5:c9:ee:34:70:05:e9:e6:bb: > be:49:93:52:e6:a8:1a:d9:b8:d4:d2:e7:c0:7b:ad:37: > bf:79:d3:2d:0b:3d:51:b2:69:f7:7f:14:8a:09:5b:ba: > 75:52:6f:db:83:17:ec:f7:39:6a:ee:99:ac:08:1a:49 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 53:92:b3:21:14:52:1e:c9:1e:ec:99:5b:4c:13:6b:80: > e9:e9:66:8e:d1:e2:9b:78:a9:06:ac:df:ab:af:dd:5e: > 64:3f:b1:9e:86:11:9b:97:57:0b:c7:5e:8e:8b:08:25: > e9:83:5b:23:f7:4b:2a:59:5f:18:96:4f:b7:95:db:73: > 68:27:b7:86:f9:84:32:d6:4f:3d:f3:b9:ec:7e:b4:aa: > 5e:11:cf:6f:6b:60:85:1e:f3:1b:c8:60:76:5e:11:8c: > db:5a:b6:fe:fa:eb:23:b9:ee:4b:62:c1:69:9b:e3:db: > d8:3d:83:4f:65:4b:22:ef:49:cf:2f:f0:9f:01:14:0b > Fingerprint (MD5): > A7:B4:F6:B3:D0:E6:47:CB:6A:3C:D2:7E:B2:D7:46:65 > Fingerprint (SHA1): > F2:FA:EE:4E:F8:C8:45:D2:F8:DB:08:33:05:DD:68:FA:7B:76:78:72 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #1606: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army >vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. Navy [Certificate Authority]: > ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. > CN=Navy ROOT CA,O=Navy,C=US >Returned value is 1, expected result is fail >chains.sh: #1607: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army - PASSED >chains.sh: Importing certificate BridgeArmy.der to AllDB database >certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der >chains.sh: #1608: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED >chains.sh: Importing certificate BridgeNavy.der to AllDB database >certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der >chains.sh: #1609: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED >chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army >vfychain -d AllDB -pp -vv UserBridge.der -t Army >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171611 (0x123fcedb) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Army ROOT CA,O=Army,C=US" > Validity: > Not Before: Thu Mar 07 00:16:11 2013 > Not After : Wed Mar 07 00:16:11 2063 > Subject: "CN=Army ROOT CA,O=Army,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d0:a0:26:a6:62:d6:f2:62:f2:2c:26:a6:ba:cb:4c:23: > 4d:18:f8:a7:db:94:4c:64:13:e0:a9:2a:cc:c8:36:37: > bd:eb:5f:d2:1c:b8:3c:e7:86:27:dc:32:07:13:e8:e9: > 13:a9:8a:18:cc:c5:dd:87:e6:82:68:85:3e:65:31:f6: > b0:a1:99:68:8b:bd:86:a5:c9:ee:34:70:05:e9:e6:bb: > be:49:93:52:e6:a8:1a:d9:b8:d4:d2:e7:c0:7b:ad:37: > bf:79:d3:2d:0b:3d:51:b2:69:f7:7f:14:8a:09:5b:ba: > 75:52:6f:db:83:17:ec:f7:39:6a:ee:99:ac:08:1a:49 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 53:92:b3:21:14:52:1e:c9:1e:ec:99:5b:4c:13:6b:80: > e9:e9:66:8e:d1:e2:9b:78:a9:06:ac:df:ab:af:dd:5e: > 64:3f:b1:9e:86:11:9b:97:57:0b:c7:5e:8e:8b:08:25: > e9:83:5b:23:f7:4b:2a:59:5f:18:96:4f:b7:95:db:73: > 68:27:b7:86:f9:84:32:d6:4f:3d:f3:b9:ec:7e:b4:aa: > 5e:11:cf:6f:6b:60:85:1e:f3:1b:c8:60:76:5e:11:8c: > db:5a:b6:fe:fa:eb:23:b9:ee:4b:62:c1:69:9b:e3:db: > d8:3d:83:4f:65:4b:22:ef:49:cf:2f:f0:9f:01:14:0b > Fingerprint (MD5): > A7:B4:F6:B3:D0:E6:47:CB:6A:3C:D2:7E:B2:D7:46:65 > Fingerprint (SHA1): > F2:FA:EE:4E:F8:C8:45:D2:F8:DB:08:33:05:DD:68:FA:7B:76:78:72 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #1610: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army - PASSED >chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy >vfychain -d AllDB -pp -vv UserBridge.der -t Navy >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171612 (0x123fcedc) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:16:11 2013 > Not After : Wed Mar 07 00:16:11 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > f9:3d:fb:cd:19:e8:c4:dd:b8:2e:ed:e4:03:97:c7:3c: > a3:70:e6:7b:b1:be:db:db:78:18:56:80:e9:2d:32:54: > 35:19:41:29:30:f0:3b:51:1a:85:de:b3:a6:c1:87:1a: > b7:5e:39:fd:af:da:ba:6a:2b:2b:11:0a:e0:df:13:af: > 80:83:ee:2c:26:83:f9:15:9e:70:20:87:be:34:e6:c4: > a3:7c:78:b1:54:1b:90:0a:39:3b:a5:c8:85:3f:b4:31: > 23:2d:8b:8d:a7:a2:d7:28:db:01:41:b4:0a:b1:c5:81: > a0:f9:c6:1b:bf:67:42:bb:cb:fd:de:ee:46:16:7e:99 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 72:0d:1a:63:88:9f:9c:96:2f:c3:8a:35:ae:36:9a:e4: > a7:74:13:dd:c6:81:5c:ad:8b:c7:f0:8b:7c:d5:42:f1: > b5:5c:12:9b:45:e8:33:18:13:02:57:ea:77:77:75:fd: > 64:c2:88:9f:b8:cf:9e:30:7c:ef:dc:e4:2a:4a:10:ab: > d7:61:74:de:15:77:30:31:76:c3:d3:9a:4b:9d:db:e7: > 58:b7:05:d9:6f:aa:8c:8b:1c:d0:ef:20:1b:c9:42:03: > 7f:2e:2a:d1:51:38:df:b7:e7:ed:f5:57:72:56:72:c8: > ef:ae:2a:63:ff:b4:f6:51:84:a9:23:b2:dd:e3:2f:73 > Fingerprint (MD5): > 71:03:3B:73:F8:8D:61:24:5D:12:53:B6:C0:3B:84:AC > Fingerprint (SHA1): > 1A:B7:52:BF:CE:9F:B6:46:8D:2B:46:57:F8:4A:C2:68:F7:21:1C:94 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #1611: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy - PASSED >chains.sh: Creating DB ArmyOnlyDB >certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd >chains.sh: #1612: Bridge: Creating DB ArmyOnlyDB - PASSED >chains.sh: Importing certificate Army.der to ArmyOnlyDB database >certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der >chains.sh: #1613: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED >chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB >vfychain -d ArmyOnlyDB -pp -vv UserBridge.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 0. CN=User EE,O=User,C=US : > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Bridge Bridge,O=Bridge,C=US >Returned value is 1, expected result is fail >chains.sh: #1614: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB >vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. bridge@navy [Certificate Authority]: >Email Address(es): bridge@navy > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Navy ROOT CA,O=Navy,C=US >Returned value is 1, expected result is fail >chains.sh: #1615: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB >vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: > ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. > CN=Navy ROOT CA,O=Navy,C=US >Returned value is 1, expected result is fail >chains.sh: #1616: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der >vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171612 (0x123fcedc) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:16:11 2013 > Not After : Wed Mar 07 00:16:11 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > f9:3d:fb:cd:19:e8:c4:dd:b8:2e:ed:e4:03:97:c7:3c: > a3:70:e6:7b:b1:be:db:db:78:18:56:80:e9:2d:32:54: > 35:19:41:29:30:f0:3b:51:1a:85:de:b3:a6:c1:87:1a: > b7:5e:39:fd:af:da:ba:6a:2b:2b:11:0a:e0:df:13:af: > 80:83:ee:2c:26:83:f9:15:9e:70:20:87:be:34:e6:c4: > a3:7c:78:b1:54:1b:90:0a:39:3b:a5:c8:85:3f:b4:31: > 23:2d:8b:8d:a7:a2:d7:28:db:01:41:b4:0a:b1:c5:81: > a0:f9:c6:1b:bf:67:42:bb:cb:fd:de:ee:46:16:7e:99 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 72:0d:1a:63:88:9f:9c:96:2f:c3:8a:35:ae:36:9a:e4: > a7:74:13:dd:c6:81:5c:ad:8b:c7:f0:8b:7c:d5:42:f1: > b5:5c:12:9b:45:e8:33:18:13:02:57:ea:77:77:75:fd: > 64:c2:88:9f:b8:cf:9e:30:7c:ef:dc:e4:2a:4a:10:ab: > d7:61:74:de:15:77:30:31:76:c3:d3:9a:4b:9d:db:e7: > 58:b7:05:d9:6f:aa:8c:8b:1c:d0:ef:20:1b:c9:42:03: > 7f:2e:2a:d1:51:38:df:b7:e7:ed:f5:57:72:56:72:c8: > ef:ae:2a:63:ff:b4:f6:51:84:a9:23:b2:dd:e3:2f:73 > Fingerprint (MD5): > 71:03:3B:73:F8:8D:61:24:5D:12:53:B6:C0:3B:84:AC > Fingerprint (SHA1): > 1A:B7:52:BF:CE:9F:B6:46:8D:2B:46:57:F8:4A:C2:68:F7:21:1C:94 >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #1617: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der >vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171612 (0x123fcedc) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:16:11 2013 > Not After : Wed Mar 07 00:16:11 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > f9:3d:fb:cd:19:e8:c4:dd:b8:2e:ed:e4:03:97:c7:3c: > a3:70:e6:7b:b1:be:db:db:78:18:56:80:e9:2d:32:54: > 35:19:41:29:30:f0:3b:51:1a:85:de:b3:a6:c1:87:1a: > b7:5e:39:fd:af:da:ba:6a:2b:2b:11:0a:e0:df:13:af: > 80:83:ee:2c:26:83:f9:15:9e:70:20:87:be:34:e6:c4: > a3:7c:78:b1:54:1b:90:0a:39:3b:a5:c8:85:3f:b4:31: > 23:2d:8b:8d:a7:a2:d7:28:db:01:41:b4:0a:b1:c5:81: > a0:f9:c6:1b:bf:67:42:bb:cb:fd:de:ee:46:16:7e:99 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 72:0d:1a:63:88:9f:9c:96:2f:c3:8a:35:ae:36:9a:e4: > a7:74:13:dd:c6:81:5c:ad:8b:c7:f0:8b:7c:d5:42:f1: > b5:5c:12:9b:45:e8:33:18:13:02:57:ea:77:77:75:fd: > 64:c2:88:9f:b8:cf:9e:30:7c:ef:dc:e4:2a:4a:10:ab: > d7:61:74:de:15:77:30:31:76:c3:d3:9a:4b:9d:db:e7: > 58:b7:05:d9:6f:aa:8c:8b:1c:d0:ef:20:1b:c9:42:03: > 7f:2e:2a:d1:51:38:df:b7:e7:ed:f5:57:72:56:72:c8: > ef:ae:2a:63:ff:b4:f6:51:84:a9:23:b2:dd:e3:2f:73 > Fingerprint (MD5): > 71:03:3B:73:F8:8D:61:24:5D:12:53:B6:C0:3B:84:AC > Fingerprint (SHA1): > 1A:B7:52:BF:CE:9F:B6:46:8D:2B:46:57:F8:4A:C2:68:F7:21:1C:94 >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #1618: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED >chains.sh: Creating DB NavyOnlyDB >certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd >chains.sh: #1619: Bridge: Creating DB NavyOnlyDB - PASSED >chains.sh: Importing certificate Navy.der to NavyOnlyDB database >certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der >chains.sh: #1620: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED >chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB >vfychain -d NavyOnlyDB -pp -vv UserBridge.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 0. CN=User EE,O=User,C=US : > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Bridge Bridge,O=Bridge,C=US >Returned value is 1, expected result is fail >chains.sh: #1621: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB >vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. bridge@army [Certificate Authority]: >Email Address(es): bridge@army > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Army ROOT CA,O=Army,C=US >Returned value is 1, expected result is fail >chains.sh: #1622: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB >vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: > ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. > CN=Army ROOT CA,O=Army,C=US >Returned value is 1, expected result is fail >chains.sh: #1623: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der >vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171611 (0x123fcedb) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Army ROOT CA,O=Army,C=US" > Validity: > Not Before: Thu Mar 07 00:16:11 2013 > Not After : Wed Mar 07 00:16:11 2063 > Subject: "CN=Army ROOT CA,O=Army,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d0:a0:26:a6:62:d6:f2:62:f2:2c:26:a6:ba:cb:4c:23: > 4d:18:f8:a7:db:94:4c:64:13:e0:a9:2a:cc:c8:36:37: > bd:eb:5f:d2:1c:b8:3c:e7:86:27:dc:32:07:13:e8:e9: > 13:a9:8a:18:cc:c5:dd:87:e6:82:68:85:3e:65:31:f6: > b0:a1:99:68:8b:bd:86:a5:c9:ee:34:70:05:e9:e6:bb: > be:49:93:52:e6:a8:1a:d9:b8:d4:d2:e7:c0:7b:ad:37: > bf:79:d3:2d:0b:3d:51:b2:69:f7:7f:14:8a:09:5b:ba: > 75:52:6f:db:83:17:ec:f7:39:6a:ee:99:ac:08:1a:49 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 53:92:b3:21:14:52:1e:c9:1e:ec:99:5b:4c:13:6b:80: > e9:e9:66:8e:d1:e2:9b:78:a9:06:ac:df:ab:af:dd:5e: > 64:3f:b1:9e:86:11:9b:97:57:0b:c7:5e:8e:8b:08:25: > e9:83:5b:23:f7:4b:2a:59:5f:18:96:4f:b7:95:db:73: > 68:27:b7:86:f9:84:32:d6:4f:3d:f3:b9:ec:7e:b4:aa: > 5e:11:cf:6f:6b:60:85:1e:f3:1b:c8:60:76:5e:11:8c: > db:5a:b6:fe:fa:eb:23:b9:ee:4b:62:c1:69:9b:e3:db: > d8:3d:83:4f:65:4b:22:ef:49:cf:2f:f0:9f:01:14:0b > Fingerprint (MD5): > A7:B4:F6:B3:D0:E6:47:CB:6A:3C:D2:7E:B2:D7:46:65 > Fingerprint (SHA1): > F2:FA:EE:4E:F8:C8:45:D2:F8:DB:08:33:05:DD:68:FA:7B:76:78:72 >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #1624: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der >vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171611 (0x123fcedb) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Army ROOT CA,O=Army,C=US" > Validity: > Not Before: Thu Mar 07 00:16:11 2013 > Not After : Wed Mar 07 00:16:11 2063 > Subject: "CN=Army ROOT CA,O=Army,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d0:a0:26:a6:62:d6:f2:62:f2:2c:26:a6:ba:cb:4c:23: > 4d:18:f8:a7:db:94:4c:64:13:e0:a9:2a:cc:c8:36:37: > bd:eb:5f:d2:1c:b8:3c:e7:86:27:dc:32:07:13:e8:e9: > 13:a9:8a:18:cc:c5:dd:87:e6:82:68:85:3e:65:31:f6: > b0:a1:99:68:8b:bd:86:a5:c9:ee:34:70:05:e9:e6:bb: > be:49:93:52:e6:a8:1a:d9:b8:d4:d2:e7:c0:7b:ad:37: > bf:79:d3:2d:0b:3d:51:b2:69:f7:7f:14:8a:09:5b:ba: > 75:52:6f:db:83:17:ec:f7:39:6a:ee:99:ac:08:1a:49 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 53:92:b3:21:14:52:1e:c9:1e:ec:99:5b:4c:13:6b:80: > e9:e9:66:8e:d1:e2:9b:78:a9:06:ac:df:ab:af:dd:5e: > 64:3f:b1:9e:86:11:9b:97:57:0b:c7:5e:8e:8b:08:25: > e9:83:5b:23:f7:4b:2a:59:5f:18:96:4f:b7:95:db:73: > 68:27:b7:86:f9:84:32:d6:4f:3d:f3:b9:ec:7e:b4:aa: > 5e:11:cf:6f:6b:60:85:1e:f3:1b:c8:60:76:5e:11:8c: > db:5a:b6:fe:fa:eb:23:b9:ee:4b:62:c1:69:9b:e3:db: > d8:3d:83:4f:65:4b:22:ef:49:cf:2f:f0:9f:01:14:0b > Fingerprint (MD5): > A7:B4:F6:B3:D0:E6:47:CB:6A:3C:D2:7E:B2:D7:46:65 > Fingerprint (SHA1): > F2:FA:EE:4E:F8:C8:45:D2:F8:DB:08:33:05:DD:68:FA:7B:76:78:72 >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #1625: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der - PASSED >chains.sh: Creating DB Root1DB >certutil -N -d Root1DB -f Root1DB/dbpasswd >chains.sh: #1626: MegaBridge_3_2: Creating DB Root1DB - PASSED >chains.sh: Creating Root CA Root1 >certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171616 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #1627: MegaBridge_3_2: Creating Root CA Root1 - PASSED >chains.sh: Exporting Root CA Root1.der >certutil -L -d Root1DB -r -n Root1 -o Root1.der >chains.sh: #1628: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED >chains.sh: Creating DB Root2DB >certutil -N -d Root2DB -f Root2DB/dbpasswd >chains.sh: #1629: MegaBridge_3_2: Creating DB Root2DB - PASSED >chains.sh: Creating Root CA Root2 >certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171617 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #1630: MegaBridge_3_2: Creating Root CA Root2 - PASSED >chains.sh: Exporting Root CA Root2.der >certutil -L -d Root2DB -r -n Root2 -o Root2.der >chains.sh: #1631: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED >chains.sh: Creating DB Root3DB >certutil -N -d Root3DB -f Root3DB/dbpasswd >chains.sh: #1632: MegaBridge_3_2: Creating DB Root3DB - PASSED >chains.sh: Creating Root CA Root3 >certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171618 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #1633: MegaBridge_3_2: Creating Root CA Root3 - PASSED >chains.sh: Exporting Root CA Root3.der >certutil -L -d Root3DB -r -n Root3 -o Root3.der >chains.sh: #1634: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED >chains.sh: Creating DB Root4DB >certutil -N -d Root4DB -f Root4DB/dbpasswd >chains.sh: #1635: MegaBridge_3_2: Creating DB Root4DB - PASSED >chains.sh: Creating Root CA Root4 >certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171619 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #1636: MegaBridge_3_2: Creating Root CA Root4 - PASSED >chains.sh: Exporting Root CA Root4.der >certutil -L -d Root4DB -r -n Root4 -o Root4.der >chains.sh: #1637: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED >chains.sh: Creating DB Root5DB >certutil -N -d Root5DB -f Root5DB/dbpasswd >chains.sh: #1638: MegaBridge_3_2: Creating DB Root5DB - PASSED >chains.sh: Creating Root CA Root5 >certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171620 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #1639: MegaBridge_3_2: Creating Root CA Root5 - PASSED >chains.sh: Exporting Root CA Root5.der >certutil -L -d Root5DB -r -n Root5 -o Root5.der >chains.sh: #1640: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED >chains.sh: Creating DB Root6DB >certutil -N -d Root6DB -f Root6DB/dbpasswd >chains.sh: #1641: MegaBridge_3_2: Creating DB Root6DB - PASSED >chains.sh: Creating Root CA Root6 >certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171621 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #1642: MegaBridge_3_2: Creating Root CA Root6 - PASSED >chains.sh: Exporting Root CA Root6.der >certutil -L -d Root6DB -r -n Root6 -o Root6.der >chains.sh: #1643: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED >chains.sh: Creating DB Root7DB >certutil -N -d Root7DB -f Root7DB/dbpasswd >chains.sh: #1644: MegaBridge_3_2: Creating DB Root7DB - PASSED >chains.sh: Creating Root CA Root7 >certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171622 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #1645: MegaBridge_3_2: Creating Root CA Root7 - PASSED >chains.sh: Exporting Root CA Root7.der >certutil -L -d Root7DB -r -n Root7 -o Root7.der >chains.sh: #1646: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED >chains.sh: Creating DB Root8DB >certutil -N -d Root8DB -f Root8DB/dbpasswd >chains.sh: #1647: MegaBridge_3_2: Creating DB Root8DB - PASSED >chains.sh: Creating Root CA Root8 >certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171623 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #1648: MegaBridge_3_2: Creating Root CA Root8 - PASSED >chains.sh: Exporting Root CA Root8.der >certutil -L -d Root8DB -r -n Root8 -o Root8.der >chains.sh: #1649: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED >chains.sh: Creating DB Root9DB >certutil -N -d Root9DB -f Root9DB/dbpasswd >chains.sh: #1650: MegaBridge_3_2: Creating DB Root9DB - PASSED >chains.sh: Creating Root CA Root9 >certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171624 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #1651: MegaBridge_3_2: Creating Root CA Root9 - PASSED >chains.sh: Exporting Root CA Root9.der >certutil -L -d Root9DB -r -n Root9 -o Root9.der >chains.sh: #1652: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED >chains.sh: Creating DB Bridge11DB >certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd >chains.sh: #1653: MegaBridge_3_2: Creating DB Bridge11DB - PASSED >chains.sh: Creating Bridge certifiate request Bridge11Req.der >certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1654: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED >chains.sh: Creating certficate Bridge11Root1.der signed by Root1 >certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 306171625 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #1655: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED >chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database >certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der >chains.sh: #1656: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED >chains.sh: Creating certficate Bridge11Root2.der signed by Root2 >certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 306171626 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #1657: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED >chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database >certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der >chains.sh: #1658: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED >chains.sh: Creating certficate Bridge11Root3.der signed by Root3 >certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 306171627 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #1659: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED >chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database >certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der >chains.sh: #1660: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED >chains.sh: Generating PKCS7 package from Bridge11DB database >cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 >chains.sh: #1661: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED >chains.sh: Creating DB Bridge12DB >certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd >chains.sh: #1662: MegaBridge_3_2: Creating DB Bridge12DB - PASSED >chains.sh: Creating Bridge certifiate request Bridge12Req.der >certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1663: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED >chains.sh: Creating certficate Bridge12Root4.der signed by Root4 >certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 306171628 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #1664: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED >chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database >certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der >chains.sh: #1665: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED >chains.sh: Creating certficate Bridge12Root5.der signed by Root5 >certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 306171629 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #1666: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED >chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database >certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der >chains.sh: #1667: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED >chains.sh: Creating certficate Bridge12Root6.der signed by Root6 >certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 306171630 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #1668: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED >chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database >certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der >chains.sh: #1669: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED >chains.sh: Generating PKCS7 package from Bridge12DB database >cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 >chains.sh: #1670: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED >chains.sh: Creating DB Bridge13DB >certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd >chains.sh: #1671: MegaBridge_3_2: Creating DB Bridge13DB - PASSED >chains.sh: Creating Bridge certifiate request Bridge13Req.der >certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1672: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED >chains.sh: Creating certficate Bridge13Root7.der signed by Root7 >certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 306171631 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #1673: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED >chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database >certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der >chains.sh: #1674: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED >chains.sh: Creating certficate Bridge13Root8.der signed by Root8 >certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 306171632 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #1675: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED >chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database >certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der >chains.sh: #1676: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED >chains.sh: Creating certficate Bridge13Root9.der signed by Root9 >certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 306171633 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #1677: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED >chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database >certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der >chains.sh: #1678: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED >chains.sh: Generating PKCS7 package from Bridge13DB database >cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 >chains.sh: #1679: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED >chains.sh: Creating DB Bridge21DB >certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd >chains.sh: #1680: MegaBridge_3_2: Creating DB Bridge21DB - PASSED >chains.sh: Creating Bridge certifiate request Bridge21Req.der >certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1681: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED >chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 >certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 306171634 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #1682: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED >chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database >certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der >chains.sh: #1683: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED >chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 >certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 306171635 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #1684: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED >chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database >certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der >chains.sh: #1685: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED >chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 >certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 306171636 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #1686: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED >chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database >certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der >chains.sh: #1687: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED >chains.sh: Generating PKCS7 package from Bridge21DB database >cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 >chains.sh: #1688: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #1689: MegaBridge_3_2: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1690: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 >certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 306171637 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #1691: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED >chains.sh: Importing certificate CA1Bridge21.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der >chains.sh: #1692: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED >chains.sh: Creating DB EE1DB >certutil -N -d EE1DB -f EE1DB/dbpasswd >chains.sh: #1693: MegaBridge_3_2: Creating DB EE1DB - PASSED >chains.sh: Creating EE certifiate request EE1Req.der >certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1694: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED >chains.sh: Creating certficate EE1CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 306171638 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #1695: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate EE1CA1.der to EE1DB database >certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der >chains.sh: #1696: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171616 (0x123fcee0) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" > Validity: > Not Before: Thu Mar 07 00:16:13 2013 > Not After : Wed Mar 07 00:16:13 2063 > Subject: "CN=Root1 ROOT CA,O=Root1,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > 9e:11:61:f8:10:5a:e8:d2:cb:e3:c7:e3:28:31:d5:e8: > 99:6c:97:7e:04:e5:1c:b5:c3:7e:3c:d6:d7:6c:c8:01: > 1e:cd:41:b1:f8:08:44:37:f7:f5:0e:05:c4:a4:ce:84: > f7:26:67:5b:43:1b:7c:f1:d4:5e:2d:b0:8c:3b:04:ec: > 87:b6:1f:31:9e:a6:a9:64:e8:35:85:24:2f:5c:fb:33: > 6b:83:c6:76:78:fe:4e:81:95:2f:b5:4a:e2:b7:e3:0a: > ac:3f:2a:93:d8:ee:39:a6:b5:cf:a7:70:1c:bc:9b:4d: > 78:26:69:f2:d7:de:b1:3f:8f:46:35:ab:55:09:8d:a1 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 20:fe:35:91:e2:ca:e5:b6:a5:8c:d6:38:d5:bf:d4:af: > 23:61:6a:2a:00:7c:68:ac:32:ac:02:af:65:57:4a:f3: > 91:50:6b:96:de:1b:71:1a:af:bf:6c:e7:25:d4:13:1e: > 29:ce:93:8d:5c:3d:e6:24:91:14:9f:65:a3:6d:32:b2: > d6:06:b4:92:0b:4f:e1:05:ed:ba:83:aa:00:27:2c:66: > 1a:5c:d6:ee:f5:bd:42:58:fd:96:f3:e0:37:58:72:eb: > 2f:53:44:f3:21:b5:89:ba:99:9b:50:9b:15:99:7c:32: > 03:18:37:08:5b:a3:4c:8b:be:10:9e:e6:3a:c6:fc:96 > Fingerprint (MD5): > E2:24:1A:3C:69:72:38:CF:F4:AF:C3:97:EC:BF:1C:D0 > Fingerprint (SHA1): > 4F:7C:63:FC:FB:A8:61:07:1D:A6:2A:FA:DC:1C:B4:7E:15:C4:AB:F1 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" >Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" >Returned value is 0, expected result is pass >chains.sh: #1697: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171617 (0x123fcee1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" > Validity: > Not Before: Thu Mar 07 00:16:13 2013 > Not After : Wed Mar 07 00:16:13 2063 > Subject: "CN=Root2 ROOT CA,O=Root2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a4:61:c3:ad:c0:12:75:55:3c:de:54:a1:d6:06:db:71: > 81:f5:b9:d6:7d:26:2d:41:38:61:2e:47:ce:a3:3d:6e: > 35:b0:83:4c:1f:1a:c3:79:7c:ba:36:bf:1e:e6:92:47: > 47:cc:8b:f7:b1:c4:63:a2:4d:9a:da:9d:fe:70:b6:36: > 4e:9f:37:ab:07:da:5f:f8:d3:00:01:15:44:f3:a6:af: > 2b:92:44:54:f9:a4:36:47:70:7f:ac:7e:9d:25:24:5c: > 7f:99:63:ac:f7:26:6f:37:20:73:19:da:1c:d5:78:57: > 0c:1c:c8:a2:16:22:ae:e5:98:6b:e9:f1:80:5b:22:df > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 0a:cd:1e:2c:9f:ff:68:42:9f:5c:8c:f9:de:80:e9:5a: > 21:00:79:dd:78:e2:9c:21:47:f1:bc:52:b8:87:c1:a7: > ca:0a:28:b5:47:c7:97:65:87:70:b9:48:d7:b0:b4:58: > 64:ed:38:22:23:4a:f4:65:20:82:ec:92:f7:08:f4:2e: > 4f:82:96:31:d9:b2:54:df:22:97:1e:09:91:22:f1:eb: > 77:a9:ea:ba:6c:2c:b6:24:4e:72:3e:68:60:c4:52:0f: > 98:68:3e:34:9d:7a:67:2e:97:d6:a5:70:21:c8:3c:55: > 43:d5:ba:5c:c3:d7:ca:c5:f8:fb:b8:b7:ac:9a:f8:82 > Fingerprint (MD5): > 27:88:4C:51:24:DC:C8:81:6C:F5:4E:A3:B1:5F:3E:93 > Fingerprint (SHA1): > C8:81:FA:34:82:9F:26:7A:DF:6F:93:DE:26:11:F3:C0:DB:3A:28:18 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" >Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" >Returned value is 0, expected result is pass >chains.sh: #1698: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171618 (0x123fcee2) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" > Validity: > Not Before: Thu Mar 07 00:16:13 2013 > Not After : Wed Mar 07 00:16:13 2063 > Subject: "CN=Root3 ROOT CA,O=Root3,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > dc:9c:1f:84:73:75:f5:6a:e2:c7:98:7c:0b:40:96:09: > 7c:3e:40:c1:69:08:53:a3:34:13:ce:60:16:50:6e:dd: > 4a:13:d8:29:6f:33:ac:cf:44:7e:70:15:db:44:98:0a: > e0:97:d4:52:b5:2a:74:19:3b:12:da:37:71:82:03:75: > 92:7b:ce:0a:5e:16:06:4c:76:c6:8b:00:fe:ad:79:e6: > bc:19:38:31:d4:72:96:a3:bd:de:d3:f2:83:20:f0:4d: > 3e:e9:d8:b1:90:29:39:fd:9e:5f:56:db:d3:3e:3a:e3: > ce:88:c4:c1:9f:c8:f3:8b:77:17:a4:b9:27:4b:d7:99 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 8b:61:60:e6:73:a7:7f:df:a4:52:42:3c:55:09:90:d5: > 1a:e5:81:5c:06:99:19:e5:fd:2f:44:5f:af:87:57:f6: > 6d:fb:eb:c8:3e:ba:4a:27:5c:1b:b0:4a:7c:9e:a8:f3: > a0:3f:b2:6a:51:11:10:9c:b5:af:af:32:15:18:e5:91: > d3:e7:3b:59:39:0d:22:9e:32:c9:e6:e9:20:7a:27:3c: > c5:6c:95:6f:82:1e:9c:94:4a:f0:c3:b0:2a:68:d8:07: > 7d:a1:fa:5a:f6:80:f2:04:61:d7:6a:16:39:3c:a8:12: > ed:bf:3a:c3:db:87:c4:d8:81:6e:89:62:c1:ff:13:da > Fingerprint (MD5): > 21:A1:B1:A3:ED:AC:DC:82:10:09:43:77:95:0E:0E:0E > Fingerprint (SHA1): > 62:BD:07:23:64:C7:41:12:F1:81:67:6E:6A:85:33:6A:5C:32:CE:35 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" >Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" >Returned value is 0, expected result is pass >chains.sh: #1699: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171619 (0x123fcee3) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" > Validity: > Not Before: Thu Mar 07 00:16:13 2013 > Not After : Wed Mar 07 00:16:13 2063 > Subject: "CN=Root4 ROOT CA,O=Root4,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d7:1f:c6:95:e5:23:90:59:96:90:1e:6e:fb:d9:12:82: > 0f:28:8e:fe:ab:d8:0c:ac:01:97:7f:6f:a1:05:30:0a: > 81:80:34:57:80:9e:cf:94:de:08:9e:f6:fd:a0:0d:b6: > fd:76:d1:a5:5e:81:86:62:87:d2:10:de:c2:af:2b:6a: > d8:b8:47:15:2f:09:6f:23:93:32:2e:46:be:95:ef:e0: > 4a:f8:3d:cc:b1:85:31:50:bc:17:13:14:9a:1f:ca:45: > 78:e8:20:e1:05:c8:9a:a2:cb:33:30:ee:b5:a1:df:d9: > cd:8f:5f:3f:0e:84:c7:0a:10:ba:d9:24:2e:c4:6c:bd > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 68:a9:4b:06:dc:b0:5f:fd:43:0c:c6:3a:40:98:bb:98: > 1b:32:65:f1:34:13:86:a0:fa:3e:75:ab:41:dc:1f:31: > dd:27:a0:4a:02:cb:30:cf:69:53:4a:c8:18:b4:c4:a4: > 4d:7c:9f:bf:48:17:a8:24:d5:0e:6a:ae:8e:92:61:af: > c4:08:27:82:28:95:f9:3d:7c:d7:9c:4e:be:b5:1a:a1: > 3f:87:d5:0f:97:4f:a4:89:de:a1:79:b5:22:63:00:36: > 7d:f2:77:18:43:a1:5d:40:ce:11:7c:5d:24:70:55:ef: > 2a:d6:8c:a4:89:a7:f7:c5:3e:6f:b0:6f:6c:40:e0:11 > Fingerprint (MD5): > A9:91:04:91:1C:C4:95:05:62:35:5D:C2:DD:DD:79:F4 > Fingerprint (SHA1): > 74:7D:9D:33:7D:B5:58:4D:44:1F:D5:7B:12:DC:B0:A0:79:0C:08:5D >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" >Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" >Returned value is 0, expected result is pass >chains.sh: #1700: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171620 (0x123fcee4) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" > Validity: > Not Before: Thu Mar 07 00:16:13 2013 > Not After : Wed Mar 07 00:16:13 2063 > Subject: "CN=Root5 ROOT CA,O=Root5,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ba:59:36:9b:ea:13:50:da:14:31:44:6d:81:4b:9f:b5: > c6:71:c7:5b:2b:f0:d4:9c:07:fd:12:6a:f1:f8:b9:62: > 92:7a:33:35:db:c3:37:ce:72:b2:4a:f8:ce:52:94:9e: > 99:75:7a:0f:ab:9f:7e:d4:c9:3a:ec:2e:5a:b7:46:7e: > ad:e9:c4:f9:23:45:02:fa:d8:92:9a:7b:2c:21:a0:b2: > 33:6a:dc:1f:44:97:b5:a5:02:dc:b5:39:f4:86:bc:68: > db:2b:34:5c:27:a2:fb:f6:63:4b:83:fc:0a:2b:46:d4: > fd:43:6f:9f:21:81:fe:18:d3:84:e2:20:14:6c:f7:df > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 0c:6e:7a:3d:34:38:59:3c:41:e3:ab:9d:7a:5e:68:39: > 58:a6:22:1b:2c:f7:ac:7f:0f:80:7f:50:e8:ff:8d:c2: > c7:24:ac:aa:25:11:81:ad:b4:34:9e:28:4b:69:db:ab: > d0:b7:59:fc:42:63:ec:81:15:b3:78:2e:c4:3c:18:b3: > 63:9e:ca:12:d6:3a:f6:2f:a8:d9:90:2c:47:13:4e:a8: > a4:a6:a0:d2:5c:40:81:53:56:20:2a:b3:8a:e3:43:ad: > 40:7d:21:da:6b:0b:70:c6:3e:14:fb:bc:c5:cf:33:38: > ac:5e:5e:13:72:c0:80:2b:22:3b:b0:87:68:14:0c:3b > Fingerprint (MD5): > 07:3A:26:2A:31:9C:42:E8:73:73:19:C7:E1:FE:CD:BB > Fingerprint (SHA1): > 33:D5:BE:C8:ED:FB:B1:4E:63:C6:40:5D:F2:65:D4:16:36:F0:26:C0 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" >Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" >Returned value is 0, expected result is pass >chains.sh: #1701: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171621 (0x123fcee5) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" > Validity: > Not Before: Thu Mar 07 00:16:14 2013 > Not After : Wed Mar 07 00:16:14 2063 > Subject: "CN=Root6 ROOT CA,O=Root6,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > cf:d0:f5:25:1e:01:5d:34:22:01:1a:2f:7a:09:fe:c7: > 70:05:c2:60:0f:75:08:eb:ab:ab:e6:74:db:5c:15:5e: > d7:b6:81:b3:69:87:68:d8:b9:d9:3b:6b:bc:8b:a3:5d: > aa:84:c0:0f:a4:dd:9f:87:d3:0b:f5:19:7e:9d:21:63: > b0:26:c8:87:da:c0:9d:cd:55:7d:34:e1:4d:fa:25:e7: > b0:9c:3d:9b:77:08:d1:b2:d9:0b:9f:e9:2b:fd:b7:85: > 01:69:73:ed:f8:b8:b9:d2:0a:d9:8b:82:71:d9:c0:45: > d7:72:76:b2:af:97:3b:08:d4:83:fe:73:a8:04:9b:db > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 99:db:fd:4f:65:0d:83:90:41:73:93:96:a9:72:49:52: > f8:ec:21:8a:12:86:8c:44:3b:73:e5:05:66:41:1b:b3: > 7b:95:31:5a:c7:06:68:9e:ea:78:ee:af:69:a9:2a:36: > e7:48:95:49:ea:6a:f3:f0:2a:ad:5d:54:50:2a:b1:bf: > 50:b4:6f:73:51:62:25:d6:0e:81:f4:bb:af:b9:01:47: > 16:1d:b3:e8:e9:4f:63:e6:b5:87:37:7a:e1:c2:ef:16: > 83:c9:5b:b7:e4:48:40:a1:d0:cd:e3:09:1d:8b:37:d4: > 3e:79:7f:14:04:e6:0e:54:84:c2:9e:6f:36:99:54:f0 > Fingerprint (MD5): > DD:5D:8E:F3:0E:51:D8:8B:32:F4:EF:05:17:2C:1D:28 > Fingerprint (SHA1): > 20:08:34:C6:88:B5:70:A1:3E:9E:2A:CA:B8:85:3B:95:3C:AC:58:9A >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" >Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" >Returned value is 0, expected result is pass >chains.sh: #1702: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171622 (0x123fcee6) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" > Validity: > Not Before: Thu Mar 07 00:16:14 2013 > Not After : Wed Mar 07 00:16:14 2063 > Subject: "CN=Root7 ROOT CA,O=Root7,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ab:d2:fd:3a:60:0b:5e:7b:f0:99:1a:5c:a7:27:e9:5a: > 74:0d:dd:61:90:4c:c0:ed:e8:02:b5:b1:3e:68:22:8c: > a6:0c:93:4f:63:7c:7c:a9:51:bf:d4:d5:68:98:25:f6: > 18:d1:75:7c:8c:e9:96:6e:3a:c9:a7:3e:d4:c1:7e:db: > 81:34:d1:be:cd:7d:fd:4e:d6:49:4b:85:3a:47:48:41: > b3:f3:c9:82:d0:bb:ac:19:9e:e3:8f:ad:22:95:3a:22: > b3:fc:00:00:5d:ce:83:f7:b6:7a:d0:de:ca:e3:ab:92: > 89:1a:0f:63:50:84:77:a4:b5:da:34:ae:91:2c:fb:cb > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 85:d7:f1:3a:90:14:8d:8e:df:68:22:c7:ab:00:df:c2: > 90:c4:3c:a8:a4:6a:00:91:df:e3:b8:23:dc:b2:e8:bc: > 6d:a8:a0:2f:c1:91:37:72:8d:1b:c5:fe:2d:88:08:44: > ba:99:50:ea:98:96:83:db:c9:03:99:e3:6e:f2:a5:5d: > 10:79:d5:f1:e7:64:c5:3d:d4:2c:f2:08:e5:75:04:1f: > d3:f2:fd:bb:51:dd:2d:f2:e3:54:45:d0:c5:a5:5e:64: > 51:73:2b:db:d0:53:7d:84:2b:04:21:d3:5f:b5:94:ae: > d7:6d:17:35:4d:98:8a:33:1a:70:27:65:a4:b9:59:86 > Fingerprint (MD5): > 8F:3D:E8:83:EF:77:07:56:BD:20:2F:B0:7C:2B:49:26 > Fingerprint (SHA1): > 6F:A5:D9:62:BB:88:B9:F4:A9:6D:E6:A5:5C:AC:9A:6D:39:00:73:5A >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" >Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" >Returned value is 0, expected result is pass >chains.sh: #1703: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171623 (0x123fcee7) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" > Validity: > Not Before: Thu Mar 07 00:16:14 2013 > Not After : Wed Mar 07 00:16:14 2063 > Subject: "CN=Root8 ROOT CA,O=Root8,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d9:25:cb:94:6d:4a:bc:80:71:1b:70:e4:8e:49:f5:f5: > 2f:20:fb:d7:32:0f:ac:64:b1:b4:7b:ca:3c:dc:38:73: > 52:50:f1:0f:a8:19:ba:b4:75:1f:3c:e2:ae:cd:25:b6: > 18:5f:80:0e:e8:c1:7b:69:47:0b:83:19:02:15:c1:9b: > 02:1e:ee:43:e4:89:2d:a9:3d:50:51:41:d8:72:34:d7: > 8e:01:67:9b:f5:52:62:a3:5d:f5:2b:19:3f:9d:3c:99: > 52:61:8d:90:a9:02:1c:8e:10:a1:38:03:8e:d9:af:82: > 1e:50:ad:6f:9a:2f:cc:da:17:32:e5:28:46:d6:ba:e1 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 29:37:5a:cb:fd:96:b4:74:c8:fc:53:26:5f:10:52:12: > 9a:db:9f:cd:27:13:b4:ad:bf:45:e3:70:1f:fd:f3:55: > 62:df:50:8b:51:83:cf:2b:1c:2c:d7:df:6c:6d:46:90: > 07:51:60:c5:74:f5:7c:95:ae:3b:82:b1:39:ee:41:3f: > 04:49:07:32:12:ed:98:c9:15:36:d0:3d:2d:e8:a1:db: > 4c:95:bb:55:47:f2:3f:4b:69:5c:22:9b:f2:d3:90:4d: > 79:ae:52:f9:cc:86:3c:3a:6c:b0:e4:b9:ba:0e:60:ee: > fd:2c:b4:db:5f:01:32:01:b5:0c:94:ce:58:f6:0e:1e > Fingerprint (MD5): > 4B:F5:86:2F:A8:04:45:D0:F4:02:93:F9:E7:A6:93:45 > Fingerprint (SHA1): > C6:6C:CC:A4:9A:74:95:78:31:C5:CE:15:4C:2E:75:63:69:FB:74:64 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" >Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" >Returned value is 0, expected result is pass >chains.sh: #1704: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171624 (0x123fcee8) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" > Validity: > Not Before: Thu Mar 07 00:16:15 2013 > Not After : Wed Mar 07 00:16:15 2063 > Subject: "CN=Root9 ROOT CA,O=Root9,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c0:7d:1a:cb:a3:a7:bc:86:11:65:45:96:bd:45:55:08: > ad:f4:ea:be:62:10:ea:d0:88:2a:5b:a7:65:5c:5d:b6: > 08:f7:d7:a4:0c:1a:bb:a1:72:9d:5e:f3:2b:75:c5:eb: > 93:83:bf:dd:03:01:64:0b:33:37:b7:03:bd:17:5a:76: > 03:99:2e:ff:f6:84:f0:0c:30:34:22:2f:c5:c0:d6:a7: > 12:0b:a6:c5:1b:a7:48:36:ef:b9:60:2a:97:06:3b:7c: > d0:a0:95:2b:ec:13:c7:1e:a6:67:94:ab:d0:c7:94:a7: > 23:f9:5d:d9:33:ea:6a:95:45:17:a6:c2:da:10:f8:05 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 1d:7c:de:7b:5b:53:5b:b3:57:7c:31:26:78:24:93:ac: > fc:0b:e2:c6:3b:b1:b4:06:db:40:31:a1:f8:88:e8:ba: > fe:87:cb:19:8a:64:6c:e1:5f:69:ce:fa:b5:fa:36:b9: > 65:0d:52:02:40:c7:bb:3f:6e:d8:f7:97:d2:bd:c4:ba: > 27:ad:4d:19:c8:a2:8c:d0:e3:7e:00:cd:2b:38:cf:6e: > bb:b4:88:c9:a8:47:ba:d9:15:9c:ee:26:47:46:28:53: > 22:c5:c9:ed:e3:c7:62:39:6f:d6:f8:ca:c9:d6:21:98: > b1:ed:ab:08:81:59:b2:5c:b5:a4:1a:e9:e5:68:f8:31 > Fingerprint (MD5): > 45:68:49:77:36:92:A0:67:70:B7:01:6C:0B:9E:8C:A3 > Fingerprint (SHA1): > D5:45:F7:28:4B:45:D6:81:C3:27:D3:CE:66:51:27:57:8E:4D:7E:26 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" >Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" >Returned value is 0, expected result is pass >chains.sh: #1705: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der - PASSED >chains.sh: Creating DB RootDB >certutil -N -d RootDB -f RootDB/dbpasswd >chains.sh: #1706: Extension: Creating DB RootDB - PASSED >chains.sh: Creating Root CA Root >certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171639 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #1707: Extension: Creating Root CA Root - PASSED >chains.sh: Exporting Root CA Root.der >certutil -L -d RootDB -r -n Root -o Root.der >chains.sh: #1708: Extension: Exporting Root CA Root.der - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #1709: Extension: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1710: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 306171640 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1711: Extension: Creating certficate CA1Root.der signed by Root - PASSED >chains.sh: Importing certificate CA1Root.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der >chains.sh: #1712: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #1713: Extension: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1714: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 306171641 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1715: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA2CA1.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der >chains.sh: #1716: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED >chains.sh: Creating DB UserDB >certutil -N -d UserDB -f UserDB/dbpasswd >chains.sh: #1717: Extension: Creating DB UserDB - PASSED >chains.sh: Creating EE certifiate request UserReq.der >certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1718: Extension: Creating EE certifiate request UserReq.der - PASSED >chains.sh: Creating certficate UserCA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 306171642 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1719: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED >chains.sh: Importing certificate UserCA2.der to UserDB database >certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der >chains.sh: #1720: Extension: Importing certificate UserCA2.der to UserDB database - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #1721: Extension: Creating DB AllDB - PASSED >chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171639 (0x123fcef7) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:17 2013 > Not After : Wed Mar 07 00:16:17 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ce:ac:19:fb:85:4d:2b:db:fa:ea:f9:23:5d:1e:b6:8d: > 04:64:5f:bd:12:67:c7:be:af:15:8c:5e:ad:16:21:d9: > 0a:d2:d0:a1:a0:a6:67:bd:cb:2f:08:e0:c6:a9:b8:30: > 17:b7:28:38:ad:85:5b:6a:ae:58:82:95:5c:18:1d:2d: > 25:fa:a6:ba:60:29:d1:91:d2:47:ae:28:b2:87:85:16: > c9:b1:18:9e:42:45:c8:54:7a:98:df:26:d8:14:40:bd: > 17:98:23:c3:47:07:3e:f3:05:3a:63:ea:47:4b:87:e5: > d5:2f:46:28:10:fb:4f:71:19:d0:6f:18:51:3a:82:09 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 89:e9:bd:38:15:2f:61:c9:62:b3:94:94:a7:b2:88:8b: > 5e:17:81:33:f5:1b:7a:34:97:4a:b1:c0:d0:6f:5f:93: > 72:21:e9:e2:d7:67:06:60:ae:7e:31:00:d8:d7:35:23: > e5:6f:a1:1d:f5:95:b0:b8:de:1d:a4:ca:86:3a:46:ef: > 23:72:c0:f0:c3:53:71:d3:88:f7:30:0c:6d:03:95:8d: > 13:51:54:b7:a7:30:9e:9a:6c:a0:e8:27:10:8d:2b:f6: > 0f:6f:8f:64:cb:f4:b0:39:81:48:5c:13:7e:cd:6b:f0: > 69:4f:85:a0:d3:f8:a7:1c:5d:69:1c:df:23:69:6f:7a > Fingerprint (MD5): > AD:00:DC:EA:17:F5:4F:55:E7:60:46:AF:37:CA:77:0A > Fingerprint (SHA1): > 28:92:ED:4C:31:C5:54:96:13:53:F4:F3:F3:78:B2:1D:EB:26:A1:85 >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #1722: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED >chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der >vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1723: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED >chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171640 (0x123fcef8) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:18 2013 > Not After : Wed Mar 07 00:16:18 2018 > Subject: "CN=CA1 Intermediate,O=CA1,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c0:bb:8d:96:3c:46:61:27:07:ab:6a:df:0a:e5:4e:67: > fe:e9:e0:78:47:b6:c7:86:da:ac:35:d5:37:b0:19:8c: > 3b:f1:8d:b3:56:70:f4:ad:ef:9f:e1:1e:6c:24:87:cf: > 99:ad:1e:de:f7:d2:ca:d3:8f:a7:6d:d8:ed:b4:f3:bd: > 17:cf:8f:b6:bf:36:72:3e:9a:c6:fd:fd:e0:26:3c:8c: > 5f:42:90:d0:5c:9d:76:5f:77:d9:64:ed:4f:6e:48:ae: > 05:d6:10:e4:bd:6e:f7:62:85:87:54:f0:07:61:53:a0: > cb:82:6c:0a:ce:5e:2b:e3:96:33:4c:64:8e:7d:a7:89 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > c9:fc:fc:e0:90:6e:ca:c1:82:5c:6f:fb:79:29:35:3d: > 82:9f:b5:b3:36:98:54:83:6d:62:ec:85:8b:5b:81:ac: > 9e:40:cf:20:a0:99:12:57:06:63:0b:8d:43:06:9e:ea: > 83:8f:5c:72:00:e8:bc:f1:e1:c4:a5:d8:77:53:89:1a: > b9:8f:3e:ed:b4:a6:3c:a1:76:48:52:40:04:52:9f:03: > 99:c4:9a:b0:7e:f6:42:94:48:fb:02:69:66:82:c7:c7: > e9:b7:ec:5e:4e:ad:ac:15:71:58:46:7d:ea:66:a2:60: > 90:0a:8e:db:bc:cd:1b:21:78:32:dc:69:83:6e:9c:a5 > Fingerprint (MD5): > C8:29:6B:2E:86:4E:84:2E:AC:6D:7A:F5:A3:8D:99:DC > Fingerprint (SHA1): > 7C:AC:F4:D0:FB:49:28:79:FA:33:DD:8D:75:15:AC:65:51:5B:F2:65 >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Returned value is 0, expected result is pass >chains.sh: #1724: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED >chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der >vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1725: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED >chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171641 (0x123fcef9) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:16:18 2013 > Not After : Wed Mar 07 00:16:18 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c1:71:fd:34:f7:fc:b3:af:c8:40:78:f0:14:15:9c:2e: > 70:4c:0e:f0:13:17:6b:fb:fc:a3:8a:c3:56:45:78:e3: > a6:ec:79:8d:3c:60:29:1a:52:df:42:df:d9:65:e3:4b: > 34:68:41:5d:ed:ff:ff:5e:f1:7e:69:81:9f:e1:ad:b3: > b2:c9:33:93:57:1f:2e:65:30:68:0b:11:e2:78:f7:38: > d9:ae:4e:d9:65:84:f4:73:2d:78:24:9e:4b:ac:db:bc: > 4c:56:2a:c9:8c:8c:c3:25:02:c5:85:ff:7f:32:6a:f0: > ee:71:2b:12:95:b7:69:06:34:c3:04:64:8c:2c:09:11 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 06:d3:05:7a:9e:89:c9:86:f4:d8:d9:e0:c5:60:37:c9: > 98:d0:d1:b8:36:a6:51:e5:18:41:62:e4:f1:da:e5:fc: > eb:a8:b9:ce:9b:d5:34:52:0d:6b:a0:9d:74:78:68:04: > e6:30:dd:04:e1:5b:d0:a8:ef:f3:c6:34:78:84:0f:bf: > 76:0c:9b:12:7a:21:48:5c:9a:a9:cb:84:2d:5b:1c:8b: > ce:61:71:10:e1:53:1b:2a:3a:08:92:31:b6:d6:ba:3b: > db:05:00:ff:8d:96:e2:e3:23:94:3d:88:ed:14:51:39: > 6f:7e:4e:fd:14:55:b5:4e:a4:4f:3d:41:be:3a:a6:af > Fingerprint (MD5): > 5B:79:7F:7B:05:B9:CF:49:AB:22:31:09:22:B0:D2:E9 > Fingerprint (SHA1): > D5:2C:B6:E6:DF:FA:B2:22:A8:7F:7E:34:96:F8:98:77:AA:1D:87:8C >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Returned value is 0, expected result is pass >chains.sh: #1726: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED >chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der >vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1727: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED >chains.sh: Importing certificate Root.der to AllDB database >certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der >chains.sh: #1728: Extension: Importing certificate Root.der to AllDB database - PASSED >chains.sh: Importing certificate CA1Root.der to AllDB database >certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der >chains.sh: #1729: Extension: Importing certificate CA1Root.der to AllDB database - PASSED >chains.sh: Importing certificate CA2CA1.der to AllDB database >certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der >chains.sh: #1730: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171639 (0x123fcef7) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:17 2013 > Not After : Wed Mar 07 00:16:17 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ce:ac:19:fb:85:4d:2b:db:fa:ea:f9:23:5d:1e:b6:8d: > 04:64:5f:bd:12:67:c7:be:af:15:8c:5e:ad:16:21:d9: > 0a:d2:d0:a1:a0:a6:67:bd:cb:2f:08:e0:c6:a9:b8:30: > 17:b7:28:38:ad:85:5b:6a:ae:58:82:95:5c:18:1d:2d: > 25:fa:a6:ba:60:29:d1:91:d2:47:ae:28:b2:87:85:16: > c9:b1:18:9e:42:45:c8:54:7a:98:df:26:d8:14:40:bd: > 17:98:23:c3:47:07:3e:f3:05:3a:63:ea:47:4b:87:e5: > d5:2f:46:28:10:fb:4f:71:19:d0:6f:18:51:3a:82:09 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 89:e9:bd:38:15:2f:61:c9:62:b3:94:94:a7:b2:88:8b: > 5e:17:81:33:f5:1b:7a:34:97:4a:b1:c0:d0:6f:5f:93: > 72:21:e9:e2:d7:67:06:60:ae:7e:31:00:d8:d7:35:23: > e5:6f:a1:1d:f5:95:b0:b8:de:1d:a4:ca:86:3a:46:ef: > 23:72:c0:f0:c3:53:71:d3:88:f7:30:0c:6d:03:95:8d: > 13:51:54:b7:a7:30:9e:9a:6c:a0:e8:27:10:8d:2b:f6: > 0f:6f:8f:64:cb:f4:b0:39:81:48:5c:13:7e:cd:6b:f0: > 69:4f:85:a0:d3:f8:a7:1c:5d:69:1c:df:23:69:6f:7a > Fingerprint (MD5): > AD:00:DC:EA:17:F5:4F:55:E7:60:46:AF:37:CA:77:0A > Fingerprint (SHA1): > 28:92:ED:4C:31:C5:54:96:13:53:F4:F3:F3:78:B2:1D:EB:26:A1:85 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #1731: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root >vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. Root [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1732: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171640 (0x123fcef8) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:18 2013 > Not After : Wed Mar 07 00:16:18 2018 > Subject: "CN=CA1 Intermediate,O=CA1,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c0:bb:8d:96:3c:46:61:27:07:ab:6a:df:0a:e5:4e:67: > fe:e9:e0:78:47:b6:c7:86:da:ac:35:d5:37:b0:19:8c: > 3b:f1:8d:b3:56:70:f4:ad:ef:9f:e1:1e:6c:24:87:cf: > 99:ad:1e:de:f7:d2:ca:d3:8f:a7:6d:d8:ed:b4:f3:bd: > 17:cf:8f:b6:bf:36:72:3e:9a:c6:fd:fd:e0:26:3c:8c: > 5f:42:90:d0:5c:9d:76:5f:77:d9:64:ed:4f:6e:48:ae: > 05:d6:10:e4:bd:6e:f7:62:85:87:54:f0:07:61:53:a0: > cb:82:6c:0a:ce:5e:2b:e3:96:33:4c:64:8e:7d:a7:89 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > c9:fc:fc:e0:90:6e:ca:c1:82:5c:6f:fb:79:29:35:3d: > 82:9f:b5:b3:36:98:54:83:6d:62:ec:85:8b:5b:81:ac: > 9e:40:cf:20:a0:99:12:57:06:63:0b:8d:43:06:9e:ea: > 83:8f:5c:72:00:e8:bc:f1:e1:c4:a5:d8:77:53:89:1a: > b9:8f:3e:ed:b4:a6:3c:a1:76:48:52:40:04:52:9f:03: > 99:c4:9a:b0:7e:f6:42:94:48:fb:02:69:66:82:c7:c7: > e9:b7:ec:5e:4e:ad:ac:15:71:58:46:7d:ea:66:a2:60: > 90:0a:8e:db:bc:cd:1b:21:78:32:dc:69:83:6e:9c:a5 > Fingerprint (MD5): > C8:29:6B:2E:86:4E:84:2E:AC:6D:7A:F5:A3:8D:99:DC > Fingerprint (SHA1): > 7C:AC:F4:D0:FB:49:28:79:FA:33:DD:8D:75:15:AC:65:51:5B:F2:65 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Returned value is 0, expected result is pass >chains.sh: #1733: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 >vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. CA1 [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1734: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171641 (0x123fcef9) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:16:18 2013 > Not After : Wed Mar 07 00:16:18 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c1:71:fd:34:f7:fc:b3:af:c8:40:78:f0:14:15:9c:2e: > 70:4c:0e:f0:13:17:6b:fb:fc:a3:8a:c3:56:45:78:e3: > a6:ec:79:8d:3c:60:29:1a:52:df:42:df:d9:65:e3:4b: > 34:68:41:5d:ed:ff:ff:5e:f1:7e:69:81:9f:e1:ad:b3: > b2:c9:33:93:57:1f:2e:65:30:68:0b:11:e2:78:f7:38: > d9:ae:4e:d9:65:84:f4:73:2d:78:24:9e:4b:ac:db:bc: > 4c:56:2a:c9:8c:8c:c3:25:02:c5:85:ff:7f:32:6a:f0: > ee:71:2b:12:95:b7:69:06:34:c3:04:64:8c:2c:09:11 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 06:d3:05:7a:9e:89:c9:86:f4:d8:d9:e0:c5:60:37:c9: > 98:d0:d1:b8:36:a6:51:e5:18:41:62:e4:f1:da:e5:fc: > eb:a8:b9:ce:9b:d5:34:52:0d:6b:a0:9d:74:78:68:04: > e6:30:dd:04:e1:5b:d0:a8:ef:f3:c6:34:78:84:0f:bf: > 76:0c:9b:12:7a:21:48:5c:9a:a9:cb:84:2d:5b:1c:8b: > ce:61:71:10:e1:53:1b:2a:3a:08:92:31:b6:d6:ba:3b: > db:05:00:ff:8d:96:e2:e3:23:94:3d:88:ed:14:51:39: > 6f:7e:4e:fd:14:55:b5:4e:a4:4f:3d:41:be:3a:a6:af > Fingerprint (MD5): > 5B:79:7F:7B:05:B9:CF:49:AB:22:31:09:22:B0:D2:E9 > Fingerprint (SHA1): > D5:2C:B6:E6:DF:FA:B2:22:A8:7F:7E:34:96:F8:98:77:AA:1D:87:8C > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Returned value is 0, expected result is pass >chains.sh: #1735: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 >vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. CA2 [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1736: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED >chains.sh: Creating DB RootDB >certutil -N -d RootDB -f RootDB/dbpasswd >chains.sh: #1737: Extension2: Creating DB RootDB - PASSED >chains.sh: Creating Root CA Root >certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171643 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #1738: Extension2: Creating Root CA Root - PASSED >chains.sh: Exporting Root CA Root.der >certutil -L -d RootDB -r -n Root -o Root.der >chains.sh: #1739: Extension2: Exporting Root CA Root.der - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #1740: Extension2: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1741: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 306171644 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >y >OID.2.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1742: Extension2: Creating certficate CA1Root.der signed by Root - PASSED >chains.sh: Importing certificate CA1Root.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der >chains.sh: #1743: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #1744: Extension2: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1745: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 306171645 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >y >OID.2.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1746: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA2CA1.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der >chains.sh: #1747: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED >chains.sh: Creating DB User1DB >certutil -N -d User1DB -f User1DB/dbpasswd >chains.sh: #1748: Extension2: Creating DB User1DB - PASSED >chains.sh: Creating EE certifiate request User1Req.der >certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1749: Extension2: Creating EE certifiate request User1Req.der - PASSED >chains.sh: Creating certficate User1CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 306171646 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1750: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate User1CA2.der to User1DB database >certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der >chains.sh: #1751: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED >chains.sh: Creating DB User2DB >certutil -N -d User2DB -f User2DB/dbpasswd >chains.sh: #1752: Extension2: Creating DB User2DB - PASSED >chains.sh: Creating EE certifiate request User2Req.der >certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1753: Extension2: Creating EE certifiate request User2Req.der - PASSED >chains.sh: Creating certficate User2CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 306171647 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >y >OID.2.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1754: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate User2CA2.der to User2DB database >certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der >chains.sh: #1755: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #1756: Extension2: Creating DB AllDB - PASSED >chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der >vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171643 (0x123fcefb) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:19 2013 > Not After : Wed Mar 07 00:16:19 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b7:71:55:0b:7b:14:2b:d4:74:26:17:a5:fe:42:7c:44: > 8e:a6:1d:ce:18:6a:bc:e9:8f:ae:2a:3b:01:80:8e:a6: > 60:7b:43:b2:28:af:11:65:ac:54:06:eb:6e:69:bb:46: > 29:4f:36:b9:ad:da:68:56:cc:75:c7:e7:3b:e6:a5:10: > 25:67:3a:64:17:36:30:bf:48:d9:b6:8f:76:42:ec:7a: > 12:11:73:e3:6d:5a:c4:bb:5a:a8:e3:39:d6:a8:11:99: > 98:f6:46:e4:e5:65:69:78:66:dc:9c:17:c5:fc:b2:99: > 89:ab:85:4b:0d:e3:23:a6:35:e2:07:37:45:52:20:41 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 17:ca:8a:f3:8c:52:23:18:38:5f:7c:af:42:31:06:57: > ff:b6:2e:a9:d3:9c:e0:0e:a4:af:32:35:75:83:e7:7c: > 12:12:3a:08:1a:d5:38:a7:e5:49:05:24:49:0e:0c:fb: > 78:30:20:af:d1:fc:bc:6d:09:5d:f8:57:00:4e:bb:7d: > 3d:9d:6c:a6:03:66:0d:f0:1d:76:26:46:35:85:53:0b: > e8:80:8b:c4:94:9f:57:d6:f8:81:82:9d:45:f9:56:ce: > 8a:0d:19:8e:04:77:ef:87:a9:61:7d:81:fb:e7:c9:b0: > 88:ce:4c:e4:85:1f:98:29:9f:65:dd:c5:6c:b0:7f:de > Fingerprint (MD5): > D9:A9:3C:83:97:23:27:33:75:1E:33:43:01:6A:58:2D > Fingerprint (SHA1): > 59:C9:E5:C9:07:12:7A:A9:9B:01:82:60:E3:89:A5:6D:2B:CE:AD:EB >Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #1757: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED >chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der >vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1758: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED >chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der >vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171644 (0x123fcefc) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:19 2013 > Not After : Wed Mar 07 00:16:19 2018 > Subject: "CN=CA1 Intermediate,O=CA1,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > f3:35:64:fb:00:1e:cf:c9:c4:47:1a:17:8c:7a:26:19: > db:ae:c3:31:b3:81:6b:b8:d6:19:3e:df:85:38:5f:99: > ad:64:04:51:b6:72:4b:b6:ed:4c:2f:47:ee:f4:d0:9b: > 60:7b:4d:23:83:70:88:00:c1:b4:3e:86:ac:d1:da:28: > 37:3f:6e:fd:ca:0c:c1:56:45:6e:cf:18:96:56:09:01: > 8c:d8:59:26:1e:21:8a:d4:4f:58:4e:10:2c:70:32:5d: > 6f:80:c0:b4:85:c4:62:de:2c:1f:d6:5f:9a:44:b3:4f: > c7:2a:20:7c:3b:8d:81:1a:04:6e:c1:60:a9:44:8d:65 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Policy Name: OID.2.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 6b:32:1f:77:b6:d8:2d:52:88:b6:0b:8c:ee:b7:c5:1b: > ac:82:e8:4f:6d:2f:0e:91:2c:52:fe:b6:9d:dc:04:3c: > 93:55:e7:ec:21:d7:03:39:47:4c:f8:6e:f5:75:f3:81: > d5:ae:3b:b9:6e:22:3d:49:99:9c:e7:8f:c6:28:e6:83: > 5e:0d:75:71:e7:fb:c4:84:0e:8b:cd:8d:fe:4d:7a:d3: > 3a:69:f9:25:0f:32:eb:67:4f:88:43:95:1c:00:5b:7d: > ad:6d:58:fc:a7:13:46:04:85:d7:a6:f9:79:96:30:51: > ee:04:b0:ea:a5:ae:05:d9:a4:d3:22:19:f0:17:dc:4a > Fingerprint (MD5): > 38:00:96:EC:72:78:1A:E8:19:71:50:33:AB:70:F9:BF > Fingerprint (SHA1): > 27:8A:AC:9D:84:84:04:7F:CE:59:06:D8:54:A0:2A:B7:D6:32:14:B5 >Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Returned value is 0, expected result is pass >chains.sh: #1759: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED >chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der >vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1760: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED >chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der >vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171645 (0x123fcefd) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:16:19 2013 > Not After : Wed Mar 07 00:16:19 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a6:6e:3f:8d:8c:75:a7:cd:c3:49:19:6c:c7:06:be:3e: > 44:5f:0a:6d:14:be:46:61:7a:43:4c:7c:af:fd:65:ae: > 1c:8f:51:4a:c3:8c:a4:66:36:d6:b2:d5:d3:a3:4b:fd: > 63:58:77:f9:be:04:8b:82:8c:78:b1:73:e9:20:ba:d0: > b0:4d:be:d4:a1:d4:1f:75:a7:6f:6c:07:40:04:8e:01: > 6e:f3:7f:31:dc:80:bf:6f:62:bd:73:cc:c9:00:2f:d0: > aa:87:95:8e:1b:5f:3c:bd:26:31:4a:5d:19:10:2d:a3: > 4f:8b:ea:e5:75:f0:b3:ee:54:02:70:d3:ac:48:60:f7 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Policy Name: OID.2.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 75:fd:a6:7a:a8:e4:45:be:a2:3a:44:dc:ca:f1:98:47: > 24:ac:4a:2c:80:38:29:05:00:a8:c6:ea:bc:06:cb:bf: > 06:ae:14:d3:40:60:db:73:31:ea:77:62:42:93:8b:d6: > 90:f1:cc:9d:37:e9:bd:f3:7b:5d:67:98:40:a2:1f:f8: > 87:5c:94:80:5f:7f:c1:d5:31:75:85:bc:a5:8a:68:cd: > 13:92:25:3d:5a:e8:8a:f4:fb:26:7c:8c:06:40:dc:0f: > 9e:b1:2e:47:5b:66:59:18:4c:90:36:fc:02:2b:11:86: > b3:95:e1:b3:96:5d:95:4a:04:28:1c:7e:f4:f1:77:53 > Fingerprint (MD5): > DA:C1:66:09:72:CD:CA:85:AD:48:6B:52:9D:BA:4B:D2 > Fingerprint (SHA1): > F1:46:7D:A1:8C:DC:6E:75:8F:BE:EC:CB:85:D2:21:D1:31:BF:ED:D4 >Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" >Returned value is 0, expected result is pass >chains.sh: #1761: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED >chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der >vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1762: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED >chains.sh: Importing certificate Root.der to AllDB database >certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der >chains.sh: #1763: Extension2: Importing certificate Root.der to AllDB database - PASSED >chains.sh: Importing certificate CA1Root.der to AllDB database >certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der >chains.sh: #1764: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED >chains.sh: Importing certificate CA2CA1.der to AllDB database >certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der >chains.sh: #1765: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED >chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root >vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171643 (0x123fcefb) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:19 2013 > Not After : Wed Mar 07 00:16:19 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b7:71:55:0b:7b:14:2b:d4:74:26:17:a5:fe:42:7c:44: > 8e:a6:1d:ce:18:6a:bc:e9:8f:ae:2a:3b:01:80:8e:a6: > 60:7b:43:b2:28:af:11:65:ac:54:06:eb:6e:69:bb:46: > 29:4f:36:b9:ad:da:68:56:cc:75:c7:e7:3b:e6:a5:10: > 25:67:3a:64:17:36:30:bf:48:d9:b6:8f:76:42:ec:7a: > 12:11:73:e3:6d:5a:c4:bb:5a:a8:e3:39:d6:a8:11:99: > 98:f6:46:e4:e5:65:69:78:66:dc:9c:17:c5:fc:b2:99: > 89:ab:85:4b:0d:e3:23:a6:35:e2:07:37:45:52:20:41 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 17:ca:8a:f3:8c:52:23:18:38:5f:7c:af:42:31:06:57: > ff:b6:2e:a9:d3:9c:e0:0e:a4:af:32:35:75:83:e7:7c: > 12:12:3a:08:1a:d5:38:a7:e5:49:05:24:49:0e:0c:fb: > 78:30:20:af:d1:fc:bc:6d:09:5d:f8:57:00:4e:bb:7d: > 3d:9d:6c:a6:03:66:0d:f0:1d:76:26:46:35:85:53:0b: > e8:80:8b:c4:94:9f:57:d6:f8:81:82:9d:45:f9:56:ce: > 8a:0d:19:8e:04:77:ef:87:a9:61:7d:81:fb:e7:c9:b0: > 88:ce:4c:e4:85:1f:98:29:9f:65:dd:c5:6c:b0:7f:de > Fingerprint (MD5): > D9:A9:3C:83:97:23:27:33:75:1E:33:43:01:6A:58:2D > Fingerprint (SHA1): > 59:C9:E5:C9:07:12:7A:A9:9B:01:82:60:E3:89:A5:6D:2B:CE:AD:EB > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #1766: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED >chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root >vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. Root [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1767: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED >chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 >vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171644 (0x123fcefc) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:19 2013 > Not After : Wed Mar 07 00:16:19 2018 > Subject: "CN=CA1 Intermediate,O=CA1,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > f3:35:64:fb:00:1e:cf:c9:c4:47:1a:17:8c:7a:26:19: > db:ae:c3:31:b3:81:6b:b8:d6:19:3e:df:85:38:5f:99: > ad:64:04:51:b6:72:4b:b6:ed:4c:2f:47:ee:f4:d0:9b: > 60:7b:4d:23:83:70:88:00:c1:b4:3e:86:ac:d1:da:28: > 37:3f:6e:fd:ca:0c:c1:56:45:6e:cf:18:96:56:09:01: > 8c:d8:59:26:1e:21:8a:d4:4f:58:4e:10:2c:70:32:5d: > 6f:80:c0:b4:85:c4:62:de:2c:1f:d6:5f:9a:44:b3:4f: > c7:2a:20:7c:3b:8d:81:1a:04:6e:c1:60:a9:44:8d:65 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Policy Name: OID.2.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 6b:32:1f:77:b6:d8:2d:52:88:b6:0b:8c:ee:b7:c5:1b: > ac:82:e8:4f:6d:2f:0e:91:2c:52:fe:b6:9d:dc:04:3c: > 93:55:e7:ec:21:d7:03:39:47:4c:f8:6e:f5:75:f3:81: > d5:ae:3b:b9:6e:22:3d:49:99:9c:e7:8f:c6:28:e6:83: > 5e:0d:75:71:e7:fb:c4:84:0e:8b:cd:8d:fe:4d:7a:d3: > 3a:69:f9:25:0f:32:eb:67:4f:88:43:95:1c:00:5b:7d: > ad:6d:58:fc:a7:13:46:04:85:d7:a6:f9:79:96:30:51: > ee:04:b0:ea:a5:ae:05:d9:a4:d3:22:19:f0:17:dc:4a > Fingerprint (MD5): > 38:00:96:EC:72:78:1A:E8:19:71:50:33:AB:70:F9:BF > Fingerprint (SHA1): > 27:8A:AC:9D:84:84:04:7F:CE:59:06:D8:54:A0:2A:B7:D6:32:14:B5 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Returned value is 0, expected result is pass >chains.sh: #1768: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED >chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 >vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. CA1 [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1769: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED >chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 >vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171645 (0x123fcefd) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:16:19 2013 > Not After : Wed Mar 07 00:16:19 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a6:6e:3f:8d:8c:75:a7:cd:c3:49:19:6c:c7:06:be:3e: > 44:5f:0a:6d:14:be:46:61:7a:43:4c:7c:af:fd:65:ae: > 1c:8f:51:4a:c3:8c:a4:66:36:d6:b2:d5:d3:a3:4b:fd: > 63:58:77:f9:be:04:8b:82:8c:78:b1:73:e9:20:ba:d0: > b0:4d:be:d4:a1:d4:1f:75:a7:6f:6c:07:40:04:8e:01: > 6e:f3:7f:31:dc:80:bf:6f:62:bd:73:cc:c9:00:2f:d0: > aa:87:95:8e:1b:5f:3c:bd:26:31:4a:5d:19:10:2d:a3: > 4f:8b:ea:e5:75:f0:b3:ee:54:02:70:d3:ac:48:60:f7 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Policy Name: OID.2.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 75:fd:a6:7a:a8:e4:45:be:a2:3a:44:dc:ca:f1:98:47: > 24:ac:4a:2c:80:38:29:05:00:a8:c6:ea:bc:06:cb:bf: > 06:ae:14:d3:40:60:db:73:31:ea:77:62:42:93:8b:d6: > 90:f1:cc:9d:37:e9:bd:f3:7b:5d:67:98:40:a2:1f:f8: > 87:5c:94:80:5f:7f:c1:d5:31:75:85:bc:a5:8a:68:cd: > 13:92:25:3d:5a:e8:8a:f4:fb:26:7c:8c:06:40:dc:0f: > 9e:b1:2e:47:5b:66:59:18:4c:90:36:fc:02:2b:11:86: > b3:95:e1:b3:96:5d:95:4a:04:28:1c:7e:f4:f1:77:53 > Fingerprint (MD5): > DA:C1:66:09:72:CD:CA:85:AD:48:6B:52:9D:BA:4B:D2 > Fingerprint (SHA1): > F1:46:7D:A1:8C:DC:6E:75:8F:BE:EC:CB:85:D2:21:D1:31:BF:ED:D4 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" >Returned value is 0, expected result is pass >chains.sh: #1770: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED >chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 >vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. CA2 [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1771: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED >chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root >vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171643 (0x123fcefb) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:19 2013 > Not After : Wed Mar 07 00:16:19 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b7:71:55:0b:7b:14:2b:d4:74:26:17:a5:fe:42:7c:44: > 8e:a6:1d:ce:18:6a:bc:e9:8f:ae:2a:3b:01:80:8e:a6: > 60:7b:43:b2:28:af:11:65:ac:54:06:eb:6e:69:bb:46: > 29:4f:36:b9:ad:da:68:56:cc:75:c7:e7:3b:e6:a5:10: > 25:67:3a:64:17:36:30:bf:48:d9:b6:8f:76:42:ec:7a: > 12:11:73:e3:6d:5a:c4:bb:5a:a8:e3:39:d6:a8:11:99: > 98:f6:46:e4:e5:65:69:78:66:dc:9c:17:c5:fc:b2:99: > 89:ab:85:4b:0d:e3:23:a6:35:e2:07:37:45:52:20:41 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 17:ca:8a:f3:8c:52:23:18:38:5f:7c:af:42:31:06:57: > ff:b6:2e:a9:d3:9c:e0:0e:a4:af:32:35:75:83:e7:7c: > 12:12:3a:08:1a:d5:38:a7:e5:49:05:24:49:0e:0c:fb: > 78:30:20:af:d1:fc:bc:6d:09:5d:f8:57:00:4e:bb:7d: > 3d:9d:6c:a6:03:66:0d:f0:1d:76:26:46:35:85:53:0b: > e8:80:8b:c4:94:9f:57:d6:f8:81:82:9d:45:f9:56:ce: > 8a:0d:19:8e:04:77:ef:87:a9:61:7d:81:fb:e7:c9:b0: > 88:ce:4c:e4:85:1f:98:29:9f:65:dd:c5:6c:b0:7f:de > Fingerprint (MD5): > D9:A9:3C:83:97:23:27:33:75:1E:33:43:01:6A:58:2D > Fingerprint (SHA1): > 59:C9:E5:C9:07:12:7A:A9:9B:01:82:60:E3:89:A5:6D:2B:CE:AD:EB > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #1772: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED >chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root >vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171643 (0x123fcefb) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:19 2013 > Not After : Wed Mar 07 00:16:19 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b7:71:55:0b:7b:14:2b:d4:74:26:17:a5:fe:42:7c:44: > 8e:a6:1d:ce:18:6a:bc:e9:8f:ae:2a:3b:01:80:8e:a6: > 60:7b:43:b2:28:af:11:65:ac:54:06:eb:6e:69:bb:46: > 29:4f:36:b9:ad:da:68:56:cc:75:c7:e7:3b:e6:a5:10: > 25:67:3a:64:17:36:30:bf:48:d9:b6:8f:76:42:ec:7a: > 12:11:73:e3:6d:5a:c4:bb:5a:a8:e3:39:d6:a8:11:99: > 98:f6:46:e4:e5:65:69:78:66:dc:9c:17:c5:fc:b2:99: > 89:ab:85:4b:0d:e3:23:a6:35:e2:07:37:45:52:20:41 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 17:ca:8a:f3:8c:52:23:18:38:5f:7c:af:42:31:06:57: > ff:b6:2e:a9:d3:9c:e0:0e:a4:af:32:35:75:83:e7:7c: > 12:12:3a:08:1a:d5:38:a7:e5:49:05:24:49:0e:0c:fb: > 78:30:20:af:d1:fc:bc:6d:09:5d:f8:57:00:4e:bb:7d: > 3d:9d:6c:a6:03:66:0d:f0:1d:76:26:46:35:85:53:0b: > e8:80:8b:c4:94:9f:57:d6:f8:81:82:9d:45:f9:56:ce: > 8a:0d:19:8e:04:77:ef:87:a9:61:7d:81:fb:e7:c9:b0: > 88:ce:4c:e4:85:1f:98:29:9f:65:dd:c5:6c:b0:7f:de > Fingerprint (MD5): > D9:A9:3C:83:97:23:27:33:75:1E:33:43:01:6A:58:2D > Fingerprint (SHA1): > 59:C9:E5:C9:07:12:7A:A9:9B:01:82:60:E3:89:A5:6D:2B:CE:AD:EB > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #1773: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED >chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 >vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171644 (0x123fcefc) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:19 2013 > Not After : Wed Mar 07 00:16:19 2018 > Subject: "CN=CA1 Intermediate,O=CA1,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > f3:35:64:fb:00:1e:cf:c9:c4:47:1a:17:8c:7a:26:19: > db:ae:c3:31:b3:81:6b:b8:d6:19:3e:df:85:38:5f:99: > ad:64:04:51:b6:72:4b:b6:ed:4c:2f:47:ee:f4:d0:9b: > 60:7b:4d:23:83:70:88:00:c1:b4:3e:86:ac:d1:da:28: > 37:3f:6e:fd:ca:0c:c1:56:45:6e:cf:18:96:56:09:01: > 8c:d8:59:26:1e:21:8a:d4:4f:58:4e:10:2c:70:32:5d: > 6f:80:c0:b4:85:c4:62:de:2c:1f:d6:5f:9a:44:b3:4f: > c7:2a:20:7c:3b:8d:81:1a:04:6e:c1:60:a9:44:8d:65 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Policy Name: OID.2.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 6b:32:1f:77:b6:d8:2d:52:88:b6:0b:8c:ee:b7:c5:1b: > ac:82:e8:4f:6d:2f:0e:91:2c:52:fe:b6:9d:dc:04:3c: > 93:55:e7:ec:21:d7:03:39:47:4c:f8:6e:f5:75:f3:81: > d5:ae:3b:b9:6e:22:3d:49:99:9c:e7:8f:c6:28:e6:83: > 5e:0d:75:71:e7:fb:c4:84:0e:8b:cd:8d:fe:4d:7a:d3: > 3a:69:f9:25:0f:32:eb:67:4f:88:43:95:1c:00:5b:7d: > ad:6d:58:fc:a7:13:46:04:85:d7:a6:f9:79:96:30:51: > ee:04:b0:ea:a5:ae:05:d9:a4:d3:22:19:f0:17:dc:4a > Fingerprint (MD5): > 38:00:96:EC:72:78:1A:E8:19:71:50:33:AB:70:F9:BF > Fingerprint (SHA1): > 27:8A:AC:9D:84:84:04:7F:CE:59:06:D8:54:A0:2A:B7:D6:32:14:B5 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Returned value is 0, expected result is pass >chains.sh: #1774: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED >chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 >vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171644 (0x123fcefc) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:19 2013 > Not After : Wed Mar 07 00:16:19 2018 > Subject: "CN=CA1 Intermediate,O=CA1,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > f3:35:64:fb:00:1e:cf:c9:c4:47:1a:17:8c:7a:26:19: > db:ae:c3:31:b3:81:6b:b8:d6:19:3e:df:85:38:5f:99: > ad:64:04:51:b6:72:4b:b6:ed:4c:2f:47:ee:f4:d0:9b: > 60:7b:4d:23:83:70:88:00:c1:b4:3e:86:ac:d1:da:28: > 37:3f:6e:fd:ca:0c:c1:56:45:6e:cf:18:96:56:09:01: > 8c:d8:59:26:1e:21:8a:d4:4f:58:4e:10:2c:70:32:5d: > 6f:80:c0:b4:85:c4:62:de:2c:1f:d6:5f:9a:44:b3:4f: > c7:2a:20:7c:3b:8d:81:1a:04:6e:c1:60:a9:44:8d:65 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: OID.1.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 6b:32:1f:77:b6:d8:2d:52:88:b6:0b:8c:ee:b7:c5:1b: > ac:82:e8:4f:6d:2f:0e:91:2c:52:fe:b6:9d:dc:04:3c: > 93:55:e7:ec:21:d7:03:39:47:4c:f8:6e:f5:75:f3:81: > d5:ae:3b:b9:6e:22:3d:49:99:9c:e7:8f:c6:28:e6:83: > 5e:0d:75:71:e7:fb:c4:84:0e:8b:cd:8d:fe:4d:7a:d3: > 3a:69:f9:25:0f:32:eb:67:4f:88:43:95:1c:00:5b:7d: > ad:6d:58:fc:a7:13:46:04:85:d7:a6:f9:79:96:30:51: > ee:04:b0:ea:a5:ae:05:d9:a4:d3:22:19:f0:17:dc:4a > Fingerprint (MD5): > 38:00:96:EC:72:78:1A:E8:19:71:50:33:AB:70:F9:BF > Fingerprint (SHA1): > 27:8A:AC:9D:84:84:04:7F:CE:59:06:D8:54:A0:2A:B7:D6:32:14:B5 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Returned value is 0, expected result is pass >chains.sh: #1775: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED >chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 >vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171645 (0x123fcefd) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:16:19 2013 > Not After : Wed Mar 07 00:16:19 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a6:6e:3f:8d:8c:75:a7:cd:c3:49:19:6c:c7:06:be:3e: > 44:5f:0a:6d:14:be:46:61:7a:43:4c:7c:af:fd:65:ae: > 1c:8f:51:4a:c3:8c:a4:66:36:d6:b2:d5:d3:a3:4b:fd: > 63:58:77:f9:be:04:8b:82:8c:78:b1:73:e9:20:ba:d0: > b0:4d:be:d4:a1:d4:1f:75:a7:6f:6c:07:40:04:8e:01: > 6e:f3:7f:31:dc:80:bf:6f:62:bd:73:cc:c9:00:2f:d0: > aa:87:95:8e:1b:5f:3c:bd:26:31:4a:5d:19:10:2d:a3: > 4f:8b:ea:e5:75:f0:b3:ee:54:02:70:d3:ac:48:60:f7 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Policy Name: OID.2.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 75:fd:a6:7a:a8:e4:45:be:a2:3a:44:dc:ca:f1:98:47: > 24:ac:4a:2c:80:38:29:05:00:a8:c6:ea:bc:06:cb:bf: > 06:ae:14:d3:40:60:db:73:31:ea:77:62:42:93:8b:d6: > 90:f1:cc:9d:37:e9:bd:f3:7b:5d:67:98:40:a2:1f:f8: > 87:5c:94:80:5f:7f:c1:d5:31:75:85:bc:a5:8a:68:cd: > 13:92:25:3d:5a:e8:8a:f4:fb:26:7c:8c:06:40:dc:0f: > 9e:b1:2e:47:5b:66:59:18:4c:90:36:fc:02:2b:11:86: > b3:95:e1:b3:96:5d:95:4a:04:28:1c:7e:f4:f1:77:53 > Fingerprint (MD5): > DA:C1:66:09:72:CD:CA:85:AD:48:6B:52:9D:BA:4B:D2 > Fingerprint (SHA1): > F1:46:7D:A1:8C:DC:6E:75:8F:BE:EC:CB:85:D2:21:D1:31:BF:ED:D4 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" >Returned value is 0, expected result is pass >chains.sh: #1776: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED >chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 >vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171645 (0x123fcefd) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:16:19 2013 > Not After : Wed Mar 07 00:16:19 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a6:6e:3f:8d:8c:75:a7:cd:c3:49:19:6c:c7:06:be:3e: > 44:5f:0a:6d:14:be:46:61:7a:43:4c:7c:af:fd:65:ae: > 1c:8f:51:4a:c3:8c:a4:66:36:d6:b2:d5:d3:a3:4b:fd: > 63:58:77:f9:be:04:8b:82:8c:78:b1:73:e9:20:ba:d0: > b0:4d:be:d4:a1:d4:1f:75:a7:6f:6c:07:40:04:8e:01: > 6e:f3:7f:31:dc:80:bf:6f:62:bd:73:cc:c9:00:2f:d0: > aa:87:95:8e:1b:5f:3c:bd:26:31:4a:5d:19:10:2d:a3: > 4f:8b:ea:e5:75:f0:b3:ee:54:02:70:d3:ac:48:60:f7 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: OID.1.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 75:fd:a6:7a:a8:e4:45:be:a2:3a:44:dc:ca:f1:98:47: > 24:ac:4a:2c:80:38:29:05:00:a8:c6:ea:bc:06:cb:bf: > 06:ae:14:d3:40:60:db:73:31:ea:77:62:42:93:8b:d6: > 90:f1:cc:9d:37:e9:bd:f3:7b:5d:67:98:40:a2:1f:f8: > 87:5c:94:80:5f:7f:c1:d5:31:75:85:bc:a5:8a:68:cd: > 13:92:25:3d:5a:e8:8a:f4:fb:26:7c:8c:06:40:dc:0f: > 9e:b1:2e:47:5b:66:59:18:4c:90:36:fc:02:2b:11:86: > b3:95:e1:b3:96:5d:95:4a:04:28:1c:7e:f4:f1:77:53 > Fingerprint (MD5): > DA:C1:66:09:72:CD:CA:85:AD:48:6B:52:9D:BA:4B:D2 > Fingerprint (SHA1): > F1:46:7D:A1:8C:DC:6E:75:8F:BE:EC:CB:85:D2:21:D1:31:BF:ED:D4 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" >Returned value is 0, expected result is pass >chains.sh: #1777: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED >chains.sh: Creating DB RootCADB >certutil -N -d RootCADB -f RootCADB/dbpasswd >chains.sh: #1778: AnyPolicy: Creating DB RootCADB - PASSED >chains.sh: Creating Root CA RootCA >certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171648 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #1779: AnyPolicy: Creating Root CA RootCA - PASSED >chains.sh: Exporting Root CA RootCA.der >certutil -L -d RootCADB -r -n RootCA -o RootCA.der >chains.sh: #1780: AnyPolicy: Exporting Root CA RootCA.der - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #1781: AnyPolicy: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1782: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1RootCA.der signed by RootCA >certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 306171649 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1783: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED >chains.sh: Importing certificate CA1RootCA.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der >chains.sh: #1784: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #1785: AnyPolicy: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1786: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 306171650 --extCP --extIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >0 >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >Enter the number of certs in the path permitted to use anyPolicy. >(press Enter for 0) > Is this a critical extension [y/N]? >chains.sh: #1787: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA2CA1.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der >chains.sh: #1788: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED >chains.sh: Creating DB CA3DB >certutil -N -d CA3DB -f CA3DB/dbpasswd >chains.sh: #1789: AnyPolicy: Creating DB CA3DB - PASSED >chains.sh: Creating Intermediate certifiate request CA3Req.der >certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1790: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED >chains.sh: Creating certficate CA3CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 306171651 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1791: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA3CA1.der to CA3DB database >certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der >chains.sh: #1792: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED >chains.sh: Creating DB User1DB >certutil -N -d User1DB -f User1DB/dbpasswd >chains.sh: #1793: AnyPolicy: Creating DB User1DB - PASSED >chains.sh: Creating EE certifiate request User1Req.der >certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1794: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED >chains.sh: Creating certficate User1CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 306171652 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1795: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate User1CA2.der to User1DB database >certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der >chains.sh: #1796: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED >chains.sh: Creating DB User2DB >certutil -N -d User2DB -f User2DB/dbpasswd >chains.sh: #1797: AnyPolicy: Creating DB User2DB - PASSED >chains.sh: Creating EE certifiate request User2Req.der >certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1798: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED >chains.sh: Creating certficate User2CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 306171653 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1799: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate User2CA2.der to User2DB database >certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der >chains.sh: #1800: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED >chains.sh: Creating DB User3DB >certutil -N -d User3DB -f User3DB/dbpasswd >chains.sh: #1801: AnyPolicy: Creating DB User3DB - PASSED >chains.sh: Creating EE certifiate request User3Req.der >certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1802: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED >chains.sh: Creating certficate User3CA3.der signed by CA3 >certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 306171654 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1803: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED >chains.sh: Importing certificate User3CA3.der to User3DB database >certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der >chains.sh: #1804: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #1805: AnyPolicy: Creating DB AllDB - PASSED >chains.sh: Importing certificate RootCA.der to AllDB database >certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der >chains.sh: #1806: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED >chains.sh: Importing certificate CA1RootCA.der to AllDB database >certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der >chains.sh: #1807: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED >chains.sh: Importing certificate CA2CA1.der to AllDB database >certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der >chains.sh: #1808: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED >chains.sh: Importing certificate CA3CA1.der to AllDB database >certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der >chains.sh: #1809: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED >chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA >vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171648 (0x123fcf00) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:16:21 2013 > Not After : Wed Mar 07 00:16:21 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e3:6f:03:72:73:e4:d3:3d:2e:09:19:d5:9f:c9:c7:b3: > 09:ec:97:ae:1d:f1:b4:43:11:21:95:d9:83:a8:95:e3: > ae:50:7a:82:0e:16:c0:47:0d:c5:2d:bd:06:d3:d8:c2: > ce:c8:49:82:4c:e4:53:7b:ef:e6:94:3d:d7:9d:2a:c1: > 47:f8:5f:ff:e1:c9:6a:a6:a5:cc:18:5d:ef:8d:35:a1: > 89:86:62:22:f8:6a:2c:a4:26:e0:c1:e0:da:5b:c6:d6: > d0:91:e8:72:59:9e:83:59:2d:87:67:c2:57:e8:38:ba: > f4:6f:5c:aa:92:49:e5:4a:1f:82:9f:40:3c:f5:bc:b7 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 29:ab:a8:3f:3a:f6:f6:78:74:79:d9:5e:05:f4:bd:9e: > f8:24:89:e3:71:41:ec:5f:8b:b8:06:8b:d0:68:6d:83: > b8:7e:45:d9:7e:b2:6b:3d:40:8c:5d:d4:4d:f2:05:66: > 30:d5:95:0e:55:bd:85:17:f4:58:11:64:27:66:96:df: > 4d:6e:90:13:9c:c2:32:60:2c:bb:2d:7c:cb:13:d1:89: > 65:4b:48:cd:d6:7a:54:5c:1c:e1:22:d7:62:bc:b4:0b: > df:51:55:1c:f3:87:0c:76:7b:e0:63:de:d1:ef:7b:c6: > a0:59:21:26:0f:e1:c7:5f:79:21:52:44:27:64:82:7b > Fingerprint (MD5): > 44:EF:41:7C:00:54:C4:C5:22:DB:10:6B:39:C6:C9:79 > Fingerprint (SHA1): > D8:25:0B:43:CC:29:2E:3E:37:AB:9F:FB:61:61:CF:65:CD:CF:51:65 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #1810: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED >chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA >vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. RootCA [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1811: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED >chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA >vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. RootCA [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1812: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED >chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA >vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. RootCA [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1813: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED >chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA >vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171648 (0x123fcf00) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:16:21 2013 > Not After : Wed Mar 07 00:16:21 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e3:6f:03:72:73:e4:d3:3d:2e:09:19:d5:9f:c9:c7:b3: > 09:ec:97:ae:1d:f1:b4:43:11:21:95:d9:83:a8:95:e3: > ae:50:7a:82:0e:16:c0:47:0d:c5:2d:bd:06:d3:d8:c2: > ce:c8:49:82:4c:e4:53:7b:ef:e6:94:3d:d7:9d:2a:c1: > 47:f8:5f:ff:e1:c9:6a:a6:a5:cc:18:5d:ef:8d:35:a1: > 89:86:62:22:f8:6a:2c:a4:26:e0:c1:e0:da:5b:c6:d6: > d0:91:e8:72:59:9e:83:59:2d:87:67:c2:57:e8:38:ba: > f4:6f:5c:aa:92:49:e5:4a:1f:82:9f:40:3c:f5:bc:b7 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 29:ab:a8:3f:3a:f6:f6:78:74:79:d9:5e:05:f4:bd:9e: > f8:24:89:e3:71:41:ec:5f:8b:b8:06:8b:d0:68:6d:83: > b8:7e:45:d9:7e:b2:6b:3d:40:8c:5d:d4:4d:f2:05:66: > 30:d5:95:0e:55:bd:85:17:f4:58:11:64:27:66:96:df: > 4d:6e:90:13:9c:c2:32:60:2c:bb:2d:7c:cb:13:d1:89: > 65:4b:48:cd:d6:7a:54:5c:1c:e1:22:d7:62:bc:b4:0b: > df:51:55:1c:f3:87:0c:76:7b:e0:63:de:d1:ef:7b:c6: > a0:59:21:26:0f:e1:c7:5f:79:21:52:44:27:64:82:7b > Fingerprint (MD5): > 44:EF:41:7C:00:54:C4:C5:22:DB:10:6B:39:C6:C9:79 > Fingerprint (SHA1): > D8:25:0B:43:CC:29:2E:3E:37:AB:9F:FB:61:61:CF:65:CD:CF:51:65 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" >Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #1814: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED >chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA >vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. RootCA [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1815: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED >chains.sh: Creating DB RootCADB >certutil -N -d RootCADB -f RootCADB/dbpasswd >chains.sh: #1816: AnyPolicyWithLevel: Creating DB RootCADB - PASSED >chains.sh: Creating Root CA RootCA >certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171655 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #1817: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED >chains.sh: Exporting Root CA RootCA.der >certutil -L -d RootCADB -r -n RootCA -o RootCA.der >chains.sh: #1818: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #1819: AnyPolicyWithLevel: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1820: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1RootCA.der signed by RootCA >certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 306171656 --extCP --extIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >n >n >1 >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >Enter the number of certs in the path permitted to use anyPolicy. >(press Enter for 0) > Is this a critical extension [y/N]? >chains.sh: #1821: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED >chains.sh: Importing certificate CA1RootCA.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der >chains.sh: #1822: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED >chains.sh: Creating DB CA12DB >certutil -N -d CA12DB -f CA12DB/dbpasswd >chains.sh: #1823: AnyPolicyWithLevel: Creating DB CA12DB - PASSED >chains.sh: Creating Intermediate certifiate request CA12Req.der >certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1824: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED >chains.sh: Creating certficate CA12CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 306171657 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1825: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA12CA1.der to CA12DB database >certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der >chains.sh: #1826: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED >chains.sh: Creating DB CA13DB >certutil -N -d CA13DB -f CA13DB/dbpasswd >chains.sh: #1827: AnyPolicyWithLevel: Creating DB CA13DB - PASSED >chains.sh: Creating Intermediate certifiate request CA13Req.der >certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1828: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED >chains.sh: Creating certficate CA13CA12.der signed by CA12 >certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 306171658 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1829: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED >chains.sh: Importing certificate CA13CA12.der to CA13DB database >certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der >chains.sh: #1830: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED >chains.sh: Creating DB EE1DB >certutil -N -d EE1DB -f EE1DB/dbpasswd >chains.sh: #1831: AnyPolicyWithLevel: Creating DB EE1DB - PASSED >chains.sh: Creating EE certifiate request EE1Req.der >certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1832: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED >chains.sh: Creating certficate EE1CA13.der signed by CA13 >certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 306171659 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1833: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED >chains.sh: Importing certificate EE1CA13.der to EE1DB database >certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der >chains.sh: #1834: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED >chains.sh: Creating DB CA22DB >certutil -N -d CA22DB -f CA22DB/dbpasswd >chains.sh: #1835: AnyPolicyWithLevel: Creating DB CA22DB - PASSED >chains.sh: Creating Intermediate certifiate request CA22Req.der >certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1836: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED >chains.sh: Creating certficate CA22CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 306171660 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1837: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA22CA1.der to CA22DB database >certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der >chains.sh: #1838: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED >chains.sh: Creating DB CA23DB >certutil -N -d CA23DB -f CA23DB/dbpasswd >chains.sh: #1839: AnyPolicyWithLevel: Creating DB CA23DB - PASSED >chains.sh: Creating Intermediate certifiate request CA23Req.der >certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1840: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED >chains.sh: Creating certficate CA23CA22.der signed by CA22 >certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 306171661 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1841: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED >chains.sh: Importing certificate CA23CA22.der to CA23DB database >certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der >chains.sh: #1842: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED >chains.sh: Creating DB EE2DB >certutil -N -d EE2DB -f EE2DB/dbpasswd >chains.sh: #1843: AnyPolicyWithLevel: Creating DB EE2DB - PASSED >chains.sh: Creating EE certifiate request EE2Req.der >certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1844: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED >chains.sh: Creating certficate EE2CA23.der signed by CA23 >certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 306171662 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1845: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED >chains.sh: Importing certificate EE2CA23.der to EE2DB database >certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der >chains.sh: #1846: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED >chains.sh: Creating DB CA32DB >certutil -N -d CA32DB -f CA32DB/dbpasswd >chains.sh: #1847: AnyPolicyWithLevel: Creating DB CA32DB - PASSED >chains.sh: Creating Intermediate certifiate request CA32Req.der >certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1848: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED >chains.sh: Creating certficate CA32CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 306171663 --extCP --extIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >n >n >1 >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >Enter the number of certs in the path permitted to use anyPolicy. >(press Enter for 0) > Is this a critical extension [y/N]? >chains.sh: #1849: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA32CA1.der to CA32DB database >certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der >chains.sh: #1850: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED >chains.sh: Creating DB CA33DB >certutil -N -d CA33DB -f CA33DB/dbpasswd >chains.sh: #1851: AnyPolicyWithLevel: Creating DB CA33DB - PASSED >chains.sh: Creating Intermediate certifiate request CA33Req.der >certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1852: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED >chains.sh: Creating certficate CA33CA32.der signed by CA32 >certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 306171664 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1853: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED >chains.sh: Importing certificate CA33CA32.der to CA33DB database >certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der >chains.sh: #1854: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED >chains.sh: Creating DB EE3DB >certutil -N -d EE3DB -f EE3DB/dbpasswd >chains.sh: #1855: AnyPolicyWithLevel: Creating DB EE3DB - PASSED >chains.sh: Creating EE certifiate request EE3Req.der >certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1856: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED >chains.sh: Creating certficate EE3CA33.der signed by CA33 >certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 306171665 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1857: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED >chains.sh: Importing certificate EE3CA33.der to EE3DB database >certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der >chains.sh: #1858: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED >chains.sh: Creating DB CA42DB >certutil -N -d CA42DB -f CA42DB/dbpasswd >chains.sh: #1859: AnyPolicyWithLevel: Creating DB CA42DB - PASSED >chains.sh: Creating Intermediate certifiate request CA42Req.der >certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1860: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED >chains.sh: Creating certficate CA42CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 306171666 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >y >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1861: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA42CA1.der to CA42DB database >certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der >chains.sh: #1862: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED >chains.sh: Creating DB CA43DB >certutil -N -d CA43DB -f CA43DB/dbpasswd >chains.sh: #1863: AnyPolicyWithLevel: Creating DB CA43DB - PASSED >chains.sh: Creating Intermediate certifiate request CA43Req.der >certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1864: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED >chains.sh: Creating certficate CA43CA42.der signed by CA42 >certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 306171667 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >y >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1865: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED >chains.sh: Importing certificate CA43CA42.der to CA43DB database >certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der >chains.sh: #1866: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED >chains.sh: Creating DB EE4DB >certutil -N -d EE4DB -f EE4DB/dbpasswd >chains.sh: #1867: AnyPolicyWithLevel: Creating DB EE4DB - PASSED >chains.sh: Creating EE certifiate request EE4Req.der >certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1868: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED >chains.sh: Creating certficate EE4CA43.der signed by CA43 >certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 306171668 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1869: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED >chains.sh: Importing certificate EE4CA43.der to EE4DB database >certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der >chains.sh: #1870: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED >chains.sh: Creating DB CA52DB >certutil -N -d CA52DB -f CA52DB/dbpasswd >chains.sh: #1871: AnyPolicyWithLevel: Creating DB CA52DB - PASSED >chains.sh: Creating Intermediate certifiate request CA52Req.der >certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1872: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED >chains.sh: Creating certficate CA52CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 306171669 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >y >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1873: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA52CA1.der to CA52DB database >certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der >chains.sh: #1874: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED >chains.sh: Creating DB CA53DB >certutil -N -d CA53DB -f CA53DB/dbpasswd >chains.sh: #1875: AnyPolicyWithLevel: Creating DB CA53DB - PASSED >chains.sh: Creating Intermediate certifiate request CA53Req.der >certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1876: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED >chains.sh: Creating certficate CA53CA52.der signed by CA52 >certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 306171670 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1877: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED >chains.sh: Importing certificate CA53CA52.der to CA53DB database >certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der >chains.sh: #1878: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED >chains.sh: Creating DB EE5DB >certutil -N -d EE5DB -f EE5DB/dbpasswd >chains.sh: #1879: AnyPolicyWithLevel: Creating DB EE5DB - PASSED >chains.sh: Creating EE certifiate request EE5Req.der >certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1880: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED >chains.sh: Creating certficate EE5CA53.der signed by CA53 >certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 306171671 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1881: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED >chains.sh: Importing certificate EE5CA53.der to EE5DB database >certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der >chains.sh: #1882: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED >chains.sh: Creating DB CA61DB >certutil -N -d CA61DB -f CA61DB/dbpasswd >chains.sh: #1883: AnyPolicyWithLevel: Creating DB CA61DB - PASSED >chains.sh: Creating Intermediate certifiate request CA61Req.der >certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1884: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED >chains.sh: Creating certficate CA61RootCA.der signed by RootCA >certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 306171672 --extCP --extIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >n >n >5 >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >Enter the number of certs in the path permitted to use anyPolicy. >(press Enter for 0) > Is this a critical extension [y/N]? >chains.sh: #1885: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED >chains.sh: Importing certificate CA61RootCA.der to CA61DB database >certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der >chains.sh: #1886: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED >chains.sh: Creating DB CA62DB >certutil -N -d CA62DB -f CA62DB/dbpasswd >chains.sh: #1887: AnyPolicyWithLevel: Creating DB CA62DB - PASSED >chains.sh: Creating Intermediate certifiate request CA62Req.der >certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1888: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED >chains.sh: Creating certficate CA62CA61.der signed by CA61 >certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 306171673 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1889: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED >chains.sh: Importing certificate CA62CA61.der to CA62DB database >certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der >chains.sh: #1890: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED >chains.sh: Creating DB EE62DB >certutil -N -d EE62DB -f EE62DB/dbpasswd >chains.sh: #1891: AnyPolicyWithLevel: Creating DB EE62DB - PASSED >chains.sh: Creating EE certifiate request EE62Req.der >certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1892: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED >chains.sh: Creating certficate EE62CA62.der signed by CA62 >certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 306171674 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1893: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED >chains.sh: Importing certificate EE62CA62.der to EE62DB database >certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der >chains.sh: #1894: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED >chains.sh: Creating DB CA63DB >certutil -N -d CA63DB -f CA63DB/dbpasswd >chains.sh: #1895: AnyPolicyWithLevel: Creating DB CA63DB - PASSED >chains.sh: Creating Intermediate certifiate request CA63Req.der >certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1896: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED >chains.sh: Creating certficate CA63CA62.der signed by CA62 >certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 306171675 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1897: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED >chains.sh: Importing certificate CA63CA62.der to CA63DB database >certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der >chains.sh: #1898: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED >chains.sh: Creating DB EE63DB >certutil -N -d EE63DB -f EE63DB/dbpasswd >chains.sh: #1899: AnyPolicyWithLevel: Creating DB EE63DB - PASSED >chains.sh: Creating EE certifiate request EE63Req.der >certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1900: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED >chains.sh: Creating certficate EE63CA63.der signed by CA63 >certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 306171676 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1901: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED >chains.sh: Importing certificate EE63CA63.der to EE63DB database >certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der >chains.sh: #1902: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED >chains.sh: Creating DB CA64DB >certutil -N -d CA64DB -f CA64DB/dbpasswd >chains.sh: #1903: AnyPolicyWithLevel: Creating DB CA64DB - PASSED >chains.sh: Creating Intermediate certifiate request CA64Req.der >certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1904: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED >chains.sh: Creating certficate CA64CA63.der signed by CA63 >certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 306171677 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1905: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED >chains.sh: Importing certificate CA64CA63.der to CA64DB database >certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der >chains.sh: #1906: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED >chains.sh: Creating DB EE64DB >certutil -N -d EE64DB -f EE64DB/dbpasswd >chains.sh: #1907: AnyPolicyWithLevel: Creating DB EE64DB - PASSED >chains.sh: Creating EE certifiate request EE64Req.der >certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1908: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED >chains.sh: Creating certficate EE64CA64.der signed by CA64 >certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 306171678 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1909: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED >chains.sh: Importing certificate EE64CA64.der to EE64DB database >certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der >chains.sh: #1910: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED >chains.sh: Creating DB CA65DB >certutil -N -d CA65DB -f CA65DB/dbpasswd >chains.sh: #1911: AnyPolicyWithLevel: Creating DB CA65DB - PASSED >chains.sh: Creating Intermediate certifiate request CA65Req.der >certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1912: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED >chains.sh: Creating certficate CA65CA64.der signed by CA64 >certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 306171679 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1913: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED >chains.sh: Importing certificate CA65CA64.der to CA65DB database >certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der >chains.sh: #1914: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED >chains.sh: Creating DB EE65DB >certutil -N -d EE65DB -f EE65DB/dbpasswd >chains.sh: #1915: AnyPolicyWithLevel: Creating DB EE65DB - PASSED >chains.sh: Creating EE certifiate request EE65Req.der >certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1916: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED >chains.sh: Creating certficate EE65CA65.der signed by CA65 >certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 306171680 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1917: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED >chains.sh: Importing certificate EE65CA65.der to EE65DB database >certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der >chains.sh: #1918: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED >chains.sh: Creating DB CA66DB >certutil -N -d CA66DB -f CA66DB/dbpasswd >chains.sh: #1919: AnyPolicyWithLevel: Creating DB CA66DB - PASSED >chains.sh: Creating Intermediate certifiate request CA66Req.der >certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1920: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED >chains.sh: Creating certficate CA66CA65.der signed by CA65 >certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 306171681 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1921: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED >chains.sh: Importing certificate CA66CA65.der to CA66DB database >certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der >chains.sh: #1922: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED >chains.sh: Creating DB EE66DB >certutil -N -d EE66DB -f EE66DB/dbpasswd >chains.sh: #1923: AnyPolicyWithLevel: Creating DB EE66DB - PASSED >chains.sh: Creating EE certifiate request EE66Req.der >certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1924: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED >chains.sh: Creating certficate EE66CA66.der signed by CA66 >certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 306171682 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1925: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED >chains.sh: Importing certificate EE66CA66.der to EE66DB database >certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der >chains.sh: #1926: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED >chains.sh: Creating DB CA67DB >certutil -N -d CA67DB -f CA67DB/dbpasswd >chains.sh: #1927: AnyPolicyWithLevel: Creating DB CA67DB - PASSED >chains.sh: Creating Intermediate certifiate request CA67Req.der >certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1928: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED >chains.sh: Creating certficate CA67CA66.der signed by CA66 >certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 306171683 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1929: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED >chains.sh: Importing certificate CA67CA66.der to CA67DB database >certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der >chains.sh: #1930: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED >chains.sh: Creating DB EE67DB >certutil -N -d EE67DB -f EE67DB/dbpasswd >chains.sh: #1931: AnyPolicyWithLevel: Creating DB EE67DB - PASSED >chains.sh: Creating EE certifiate request EE67Req.der >certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1932: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED >chains.sh: Creating certficate EE67CA67.der signed by CA67 >certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 306171684 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1933: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED >chains.sh: Importing certificate EE67CA67.der to EE67DB database >certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der >chains.sh: #1934: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #1935: AnyPolicyWithLevel: Creating DB AllDB - PASSED >chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171655 (0x123fcf07) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:16:23 2013 > Not After : Wed Mar 07 00:16:23 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a0:97:ed:31:7f:13:92:27:e1:bd:b3:df:aa:01:3a:52: > 68:60:cc:e5:97:37:9e:e1:ea:93:48:da:4b:be:65:df: > 10:13:12:6a:55:fe:97:b3:2a:40:47:ba:0b:a8:6e:5f: > 92:ff:65:12:6a:8e:41:85:3f:7b:08:3e:29:65:29:5b: > 05:97:97:6f:3f:50:97:68:d4:bb:8f:96:7c:84:b6:e6: > 99:90:38:d0:5e:46:e3:a0:41:f4:24:ca:db:c7:4d:d9: > 6d:89:df:9a:33:d4:40:8a:c4:54:94:77:22:fa:f2:31: > 37:4f:67:42:50:da:b2:94:7a:8f:37:6e:32:a8:d2:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 70:84:66:fe:19:c7:70:4c:88:b0:21:ee:b5:12:fc:7c: > 13:40:2b:83:3e:54:58:da:aa:cc:4e:92:3e:d7:be:8a: > 6c:c6:55:f5:4e:6c:5b:67:a1:10:a1:d9:66:3f:50:97: > 65:45:5d:e6:9e:9f:de:0d:cf:b7:b7:dd:58:78:cb:61: > a2:e3:07:3e:61:a9:f9:5c:34:0d:eb:a3:21:b2:ef:a8: > 95:e7:50:82:b6:0c:42:05:5c:ab:e4:29:bd:4c:fc:d9: > 8f:b7:73:15:d8:ea:50:2f:6c:9a:96:d2:f3:22:5b:bc: > f4:24:eb:7d:df:70:64:14:27:48:54:45:b4:fa:51:9c > Fingerprint (MD5): > 68:E9:DD:AE:DD:52:3C:E0:7C:49:31:97:24:04:D0:42 > Fingerprint (SHA1): > A8:A3:D0:06:34:A4:56:56:03:CA:61:B8:B2:06:77:CB:92:D3:4F:6F >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" >Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" >Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #1936: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1937: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171655 (0x123fcf07) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:16:23 2013 > Not After : Wed Mar 07 00:16:23 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a0:97:ed:31:7f:13:92:27:e1:bd:b3:df:aa:01:3a:52: > 68:60:cc:e5:97:37:9e:e1:ea:93:48:da:4b:be:65:df: > 10:13:12:6a:55:fe:97:b3:2a:40:47:ba:0b:a8:6e:5f: > 92:ff:65:12:6a:8e:41:85:3f:7b:08:3e:29:65:29:5b: > 05:97:97:6f:3f:50:97:68:d4:bb:8f:96:7c:84:b6:e6: > 99:90:38:d0:5e:46:e3:a0:41:f4:24:ca:db:c7:4d:d9: > 6d:89:df:9a:33:d4:40:8a:c4:54:94:77:22:fa:f2:31: > 37:4f:67:42:50:da:b2:94:7a:8f:37:6e:32:a8:d2:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 70:84:66:fe:19:c7:70:4c:88:b0:21:ee:b5:12:fc:7c: > 13:40:2b:83:3e:54:58:da:aa:cc:4e:92:3e:d7:be:8a: > 6c:c6:55:f5:4e:6c:5b:67:a1:10:a1:d9:66:3f:50:97: > 65:45:5d:e6:9e:9f:de:0d:cf:b7:b7:dd:58:78:cb:61: > a2:e3:07:3e:61:a9:f9:5c:34:0d:eb:a3:21:b2:ef:a8: > 95:e7:50:82:b6:0c:42:05:5c:ab:e4:29:bd:4c:fc:d9: > 8f:b7:73:15:d8:ea:50:2f:6c:9a:96:d2:f3:22:5b:bc: > f4:24:eb:7d:df:70:64:14:27:48:54:45:b4:fa:51:9c > Fingerprint (MD5): > 68:E9:DD:AE:DD:52:3C:E0:7C:49:31:97:24:04:D0:42 > Fingerprint (SHA1): > A8:A3:D0:06:34:A4:56:56:03:CA:61:B8:B2:06:77:CB:92:D3:4F:6F >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" >Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" >Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #1938: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1939: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1940: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1941: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der >vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171655 (0x123fcf07) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:16:23 2013 > Not After : Wed Mar 07 00:16:23 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a0:97:ed:31:7f:13:92:27:e1:bd:b3:df:aa:01:3a:52: > 68:60:cc:e5:97:37:9e:e1:ea:93:48:da:4b:be:65:df: > 10:13:12:6a:55:fe:97:b3:2a:40:47:ba:0b:a8:6e:5f: > 92:ff:65:12:6a:8e:41:85:3f:7b:08:3e:29:65:29:5b: > 05:97:97:6f:3f:50:97:68:d4:bb:8f:96:7c:84:b6:e6: > 99:90:38:d0:5e:46:e3:a0:41:f4:24:ca:db:c7:4d:d9: > 6d:89:df:9a:33:d4:40:8a:c4:54:94:77:22:fa:f2:31: > 37:4f:67:42:50:da:b2:94:7a:8f:37:6e:32:a8:d2:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 70:84:66:fe:19:c7:70:4c:88:b0:21:ee:b5:12:fc:7c: > 13:40:2b:83:3e:54:58:da:aa:cc:4e:92:3e:d7:be:8a: > 6c:c6:55:f5:4e:6c:5b:67:a1:10:a1:d9:66:3f:50:97: > 65:45:5d:e6:9e:9f:de:0d:cf:b7:b7:dd:58:78:cb:61: > a2:e3:07:3e:61:a9:f9:5c:34:0d:eb:a3:21:b2:ef:a8: > 95:e7:50:82:b6:0c:42:05:5c:ab:e4:29:bd:4c:fc:d9: > 8f:b7:73:15:d8:ea:50:2f:6c:9a:96:d2:f3:22:5b:bc: > f4:24:eb:7d:df:70:64:14:27:48:54:45:b4:fa:51:9c > Fingerprint (MD5): > 68:E9:DD:AE:DD:52:3C:E0:7C:49:31:97:24:04:D0:42 > Fingerprint (SHA1): > A8:A3:D0:06:34:A4:56:56:03:CA:61:B8:B2:06:77:CB:92:D3:4F:6F >Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" >Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" >Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" >Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #1942: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1943: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1944: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1945: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der >vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171655 (0x123fcf07) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:16:23 2013 > Not After : Wed Mar 07 00:16:23 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a0:97:ed:31:7f:13:92:27:e1:bd:b3:df:aa:01:3a:52: > 68:60:cc:e5:97:37:9e:e1:ea:93:48:da:4b:be:65:df: > 10:13:12:6a:55:fe:97:b3:2a:40:47:ba:0b:a8:6e:5f: > 92:ff:65:12:6a:8e:41:85:3f:7b:08:3e:29:65:29:5b: > 05:97:97:6f:3f:50:97:68:d4:bb:8f:96:7c:84:b6:e6: > 99:90:38:d0:5e:46:e3:a0:41:f4:24:ca:db:c7:4d:d9: > 6d:89:df:9a:33:d4:40:8a:c4:54:94:77:22:fa:f2:31: > 37:4f:67:42:50:da:b2:94:7a:8f:37:6e:32:a8:d2:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 70:84:66:fe:19:c7:70:4c:88:b0:21:ee:b5:12:fc:7c: > 13:40:2b:83:3e:54:58:da:aa:cc:4e:92:3e:d7:be:8a: > 6c:c6:55:f5:4e:6c:5b:67:a1:10:a1:d9:66:3f:50:97: > 65:45:5d:e6:9e:9f:de:0d:cf:b7:b7:dd:58:78:cb:61: > a2:e3:07:3e:61:a9:f9:5c:34:0d:eb:a3:21:b2:ef:a8: > 95:e7:50:82:b6:0c:42:05:5c:ab:e4:29:bd:4c:fc:d9: > 8f:b7:73:15:d8:ea:50:2f:6c:9a:96:d2:f3:22:5b:bc: > f4:24:eb:7d:df:70:64:14:27:48:54:45:b4:fa:51:9c > Fingerprint (MD5): > 68:E9:DD:AE:DD:52:3C:E0:7C:49:31:97:24:04:D0:42 > Fingerprint (SHA1): > A8:A3:D0:06:34:A4:56:56:03:CA:61:B8:B2:06:77:CB:92:D3:4F:6F >Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" >Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" >Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" >Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #1946: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171655 (0x123fcf07) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:16:23 2013 > Not After : Wed Mar 07 00:16:23 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a0:97:ed:31:7f:13:92:27:e1:bd:b3:df:aa:01:3a:52: > 68:60:cc:e5:97:37:9e:e1:ea:93:48:da:4b:be:65:df: > 10:13:12:6a:55:fe:97:b3:2a:40:47:ba:0b:a8:6e:5f: > 92:ff:65:12:6a:8e:41:85:3f:7b:08:3e:29:65:29:5b: > 05:97:97:6f:3f:50:97:68:d4:bb:8f:96:7c:84:b6:e6: > 99:90:38:d0:5e:46:e3:a0:41:f4:24:ca:db:c7:4d:d9: > 6d:89:df:9a:33:d4:40:8a:c4:54:94:77:22:fa:f2:31: > 37:4f:67:42:50:da:b2:94:7a:8f:37:6e:32:a8:d2:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 70:84:66:fe:19:c7:70:4c:88:b0:21:ee:b5:12:fc:7c: > 13:40:2b:83:3e:54:58:da:aa:cc:4e:92:3e:d7:be:8a: > 6c:c6:55:f5:4e:6c:5b:67:a1:10:a1:d9:66:3f:50:97: > 65:45:5d:e6:9e:9f:de:0d:cf:b7:b7:dd:58:78:cb:61: > a2:e3:07:3e:61:a9:f9:5c:34:0d:eb:a3:21:b2:ef:a8: > 95:e7:50:82:b6:0c:42:05:5c:ab:e4:29:bd:4c:fc:d9: > 8f:b7:73:15:d8:ea:50:2f:6c:9a:96:d2:f3:22:5b:bc: > f4:24:eb:7d:df:70:64:14:27:48:54:45:b4:fa:51:9c > Fingerprint (MD5): > 68:E9:DD:AE:DD:52:3C:E0:7C:49:31:97:24:04:D0:42 > Fingerprint (SHA1): > A8:A3:D0:06:34:A4:56:56:03:CA:61:B8:B2:06:77:CB:92:D3:4F:6F >Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" >Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" >Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" >Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #1947: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1948: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171655 (0x123fcf07) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:16:23 2013 > Not After : Wed Mar 07 00:16:23 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a0:97:ed:31:7f:13:92:27:e1:bd:b3:df:aa:01:3a:52: > 68:60:cc:e5:97:37:9e:e1:ea:93:48:da:4b:be:65:df: > 10:13:12:6a:55:fe:97:b3:2a:40:47:ba:0b:a8:6e:5f: > 92:ff:65:12:6a:8e:41:85:3f:7b:08:3e:29:65:29:5b: > 05:97:97:6f:3f:50:97:68:d4:bb:8f:96:7c:84:b6:e6: > 99:90:38:d0:5e:46:e3:a0:41:f4:24:ca:db:c7:4d:d9: > 6d:89:df:9a:33:d4:40:8a:c4:54:94:77:22:fa:f2:31: > 37:4f:67:42:50:da:b2:94:7a:8f:37:6e:32:a8:d2:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 70:84:66:fe:19:c7:70:4c:88:b0:21:ee:b5:12:fc:7c: > 13:40:2b:83:3e:54:58:da:aa:cc:4e:92:3e:d7:be:8a: > 6c:c6:55:f5:4e:6c:5b:67:a1:10:a1:d9:66:3f:50:97: > 65:45:5d:e6:9e:9f:de:0d:cf:b7:b7:dd:58:78:cb:61: > a2:e3:07:3e:61:a9:f9:5c:34:0d:eb:a3:21:b2:ef:a8: > 95:e7:50:82:b6:0c:42:05:5c:ab:e4:29:bd:4c:fc:d9: > 8f:b7:73:15:d8:ea:50:2f:6c:9a:96:d2:f3:22:5b:bc: > f4:24:eb:7d:df:70:64:14:27:48:54:45:b4:fa:51:9c > Fingerprint (MD5): > 68:E9:DD:AE:DD:52:3C:E0:7C:49:31:97:24:04:D0:42 > Fingerprint (SHA1): > A8:A3:D0:06:34:A4:56:56:03:CA:61:B8:B2:06:77:CB:92:D3:4F:6F >Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" >Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" >Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" >Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #1949: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1950: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1951: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1952: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der >vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171655 (0x123fcf07) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:16:23 2013 > Not After : Wed Mar 07 00:16:23 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a0:97:ed:31:7f:13:92:27:e1:bd:b3:df:aa:01:3a:52: > 68:60:cc:e5:97:37:9e:e1:ea:93:48:da:4b:be:65:df: > 10:13:12:6a:55:fe:97:b3:2a:40:47:ba:0b:a8:6e:5f: > 92:ff:65:12:6a:8e:41:85:3f:7b:08:3e:29:65:29:5b: > 05:97:97:6f:3f:50:97:68:d4:bb:8f:96:7c:84:b6:e6: > 99:90:38:d0:5e:46:e3:a0:41:f4:24:ca:db:c7:4d:d9: > 6d:89:df:9a:33:d4:40:8a:c4:54:94:77:22:fa:f2:31: > 37:4f:67:42:50:da:b2:94:7a:8f:37:6e:32:a8:d2:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 70:84:66:fe:19:c7:70:4c:88:b0:21:ee:b5:12:fc:7c: > 13:40:2b:83:3e:54:58:da:aa:cc:4e:92:3e:d7:be:8a: > 6c:c6:55:f5:4e:6c:5b:67:a1:10:a1:d9:66:3f:50:97: > 65:45:5d:e6:9e:9f:de:0d:cf:b7:b7:dd:58:78:cb:61: > a2:e3:07:3e:61:a9:f9:5c:34:0d:eb:a3:21:b2:ef:a8: > 95:e7:50:82:b6:0c:42:05:5c:ab:e4:29:bd:4c:fc:d9: > 8f:b7:73:15:d8:ea:50:2f:6c:9a:96:d2:f3:22:5b:bc: > f4:24:eb:7d:df:70:64:14:27:48:54:45:b4:fa:51:9c > Fingerprint (MD5): > 68:E9:DD:AE:DD:52:3C:E0:7C:49:31:97:24:04:D0:42 > Fingerprint (SHA1): > A8:A3:D0:06:34:A4:56:56:03:CA:61:B8:B2:06:77:CB:92:D3:4F:6F >Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" >Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" >Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" >Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #1953: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171655 (0x123fcf07) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:16:23 2013 > Not After : Wed Mar 07 00:16:23 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a0:97:ed:31:7f:13:92:27:e1:bd:b3:df:aa:01:3a:52: > 68:60:cc:e5:97:37:9e:e1:ea:93:48:da:4b:be:65:df: > 10:13:12:6a:55:fe:97:b3:2a:40:47:ba:0b:a8:6e:5f: > 92:ff:65:12:6a:8e:41:85:3f:7b:08:3e:29:65:29:5b: > 05:97:97:6f:3f:50:97:68:d4:bb:8f:96:7c:84:b6:e6: > 99:90:38:d0:5e:46:e3:a0:41:f4:24:ca:db:c7:4d:d9: > 6d:89:df:9a:33:d4:40:8a:c4:54:94:77:22:fa:f2:31: > 37:4f:67:42:50:da:b2:94:7a:8f:37:6e:32:a8:d2:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 70:84:66:fe:19:c7:70:4c:88:b0:21:ee:b5:12:fc:7c: > 13:40:2b:83:3e:54:58:da:aa:cc:4e:92:3e:d7:be:8a: > 6c:c6:55:f5:4e:6c:5b:67:a1:10:a1:d9:66:3f:50:97: > 65:45:5d:e6:9e:9f:de:0d:cf:b7:b7:dd:58:78:cb:61: > a2:e3:07:3e:61:a9:f9:5c:34:0d:eb:a3:21:b2:ef:a8: > 95:e7:50:82:b6:0c:42:05:5c:ab:e4:29:bd:4c:fc:d9: > 8f:b7:73:15:d8:ea:50:2f:6c:9a:96:d2:f3:22:5b:bc: > f4:24:eb:7d:df:70:64:14:27:48:54:45:b4:fa:51:9c > Fingerprint (MD5): > 68:E9:DD:AE:DD:52:3C:E0:7C:49:31:97:24:04:D0:42 > Fingerprint (SHA1): > A8:A3:D0:06:34:A4:56:56:03:CA:61:B8:B2:06:77:CB:92:D3:4F:6F >Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" >Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" >Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" >Returned value is 0, expected result is pass >chains.sh: #1954: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171655 (0x123fcf07) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:16:23 2013 > Not After : Wed Mar 07 00:16:23 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a0:97:ed:31:7f:13:92:27:e1:bd:b3:df:aa:01:3a:52: > 68:60:cc:e5:97:37:9e:e1:ea:93:48:da:4b:be:65:df: > 10:13:12:6a:55:fe:97:b3:2a:40:47:ba:0b:a8:6e:5f: > 92:ff:65:12:6a:8e:41:85:3f:7b:08:3e:29:65:29:5b: > 05:97:97:6f:3f:50:97:68:d4:bb:8f:96:7c:84:b6:e6: > 99:90:38:d0:5e:46:e3:a0:41:f4:24:ca:db:c7:4d:d9: > 6d:89:df:9a:33:d4:40:8a:c4:54:94:77:22:fa:f2:31: > 37:4f:67:42:50:da:b2:94:7a:8f:37:6e:32:a8:d2:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 70:84:66:fe:19:c7:70:4c:88:b0:21:ee:b5:12:fc:7c: > 13:40:2b:83:3e:54:58:da:aa:cc:4e:92:3e:d7:be:8a: > 6c:c6:55:f5:4e:6c:5b:67:a1:10:a1:d9:66:3f:50:97: > 65:45:5d:e6:9e:9f:de:0d:cf:b7:b7:dd:58:78:cb:61: > a2:e3:07:3e:61:a9:f9:5c:34:0d:eb:a3:21:b2:ef:a8: > 95:e7:50:82:b6:0c:42:05:5c:ab:e4:29:bd:4c:fc:d9: > 8f:b7:73:15:d8:ea:50:2f:6c:9a:96:d2:f3:22:5b:bc: > f4:24:eb:7d:df:70:64:14:27:48:54:45:b4:fa:51:9c > Fingerprint (MD5): > 68:E9:DD:AE:DD:52:3C:E0:7C:49:31:97:24:04:D0:42 > Fingerprint (SHA1): > A8:A3:D0:06:34:A4:56:56:03:CA:61:B8:B2:06:77:CB:92:D3:4F:6F >Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" >Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" >Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" >Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" >Returned value is 0, expected result is pass >chains.sh: #1955: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171655 (0x123fcf07) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:16:23 2013 > Not After : Wed Mar 07 00:16:23 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a0:97:ed:31:7f:13:92:27:e1:bd:b3:df:aa:01:3a:52: > 68:60:cc:e5:97:37:9e:e1:ea:93:48:da:4b:be:65:df: > 10:13:12:6a:55:fe:97:b3:2a:40:47:ba:0b:a8:6e:5f: > 92:ff:65:12:6a:8e:41:85:3f:7b:08:3e:29:65:29:5b: > 05:97:97:6f:3f:50:97:68:d4:bb:8f:96:7c:84:b6:e6: > 99:90:38:d0:5e:46:e3:a0:41:f4:24:ca:db:c7:4d:d9: > 6d:89:df:9a:33:d4:40:8a:c4:54:94:77:22:fa:f2:31: > 37:4f:67:42:50:da:b2:94:7a:8f:37:6e:32:a8:d2:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 70:84:66:fe:19:c7:70:4c:88:b0:21:ee:b5:12:fc:7c: > 13:40:2b:83:3e:54:58:da:aa:cc:4e:92:3e:d7:be:8a: > 6c:c6:55:f5:4e:6c:5b:67:a1:10:a1:d9:66:3f:50:97: > 65:45:5d:e6:9e:9f:de:0d:cf:b7:b7:dd:58:78:cb:61: > a2:e3:07:3e:61:a9:f9:5c:34:0d:eb:a3:21:b2:ef:a8: > 95:e7:50:82:b6:0c:42:05:5c:ab:e4:29:bd:4c:fc:d9: > 8f:b7:73:15:d8:ea:50:2f:6c:9a:96:d2:f3:22:5b:bc: > f4:24:eb:7d:df:70:64:14:27:48:54:45:b4:fa:51:9c > Fingerprint (MD5): > 68:E9:DD:AE:DD:52:3C:E0:7C:49:31:97:24:04:D0:42 > Fingerprint (SHA1): > A8:A3:D0:06:34:A4:56:56:03:CA:61:B8:B2:06:77:CB:92:D3:4F:6F >Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" >Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" >Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" >Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" >Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" >Returned value is 0, expected result is pass >chains.sh: #1956: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171655 (0x123fcf07) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:16:23 2013 > Not After : Wed Mar 07 00:16:23 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a0:97:ed:31:7f:13:92:27:e1:bd:b3:df:aa:01:3a:52: > 68:60:cc:e5:97:37:9e:e1:ea:93:48:da:4b:be:65:df: > 10:13:12:6a:55:fe:97:b3:2a:40:47:ba:0b:a8:6e:5f: > 92:ff:65:12:6a:8e:41:85:3f:7b:08:3e:29:65:29:5b: > 05:97:97:6f:3f:50:97:68:d4:bb:8f:96:7c:84:b6:e6: > 99:90:38:d0:5e:46:e3:a0:41:f4:24:ca:db:c7:4d:d9: > 6d:89:df:9a:33:d4:40:8a:c4:54:94:77:22:fa:f2:31: > 37:4f:67:42:50:da:b2:94:7a:8f:37:6e:32:a8:d2:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 70:84:66:fe:19:c7:70:4c:88:b0:21:ee:b5:12:fc:7c: > 13:40:2b:83:3e:54:58:da:aa:cc:4e:92:3e:d7:be:8a: > 6c:c6:55:f5:4e:6c:5b:67:a1:10:a1:d9:66:3f:50:97: > 65:45:5d:e6:9e:9f:de:0d:cf:b7:b7:dd:58:78:cb:61: > a2:e3:07:3e:61:a9:f9:5c:34:0d:eb:a3:21:b2:ef:a8: > 95:e7:50:82:b6:0c:42:05:5c:ab:e4:29:bd:4c:fc:d9: > 8f:b7:73:15:d8:ea:50:2f:6c:9a:96:d2:f3:22:5b:bc: > f4:24:eb:7d:df:70:64:14:27:48:54:45:b4:fa:51:9c > Fingerprint (MD5): > 68:E9:DD:AE:DD:52:3C:E0:7C:49:31:97:24:04:D0:42 > Fingerprint (SHA1): > A8:A3:D0:06:34:A4:56:56:03:CA:61:B8:B2:06:77:CB:92:D3:4F:6F >Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" >Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" >Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" >Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" >Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" >Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" >Returned value is 0, expected result is pass >chains.sh: #1957: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171655 (0x123fcf07) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:16:23 2013 > Not After : Wed Mar 07 00:16:23 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a0:97:ed:31:7f:13:92:27:e1:bd:b3:df:aa:01:3a:52: > 68:60:cc:e5:97:37:9e:e1:ea:93:48:da:4b:be:65:df: > 10:13:12:6a:55:fe:97:b3:2a:40:47:ba:0b:a8:6e:5f: > 92:ff:65:12:6a:8e:41:85:3f:7b:08:3e:29:65:29:5b: > 05:97:97:6f:3f:50:97:68:d4:bb:8f:96:7c:84:b6:e6: > 99:90:38:d0:5e:46:e3:a0:41:f4:24:ca:db:c7:4d:d9: > 6d:89:df:9a:33:d4:40:8a:c4:54:94:77:22:fa:f2:31: > 37:4f:67:42:50:da:b2:94:7a:8f:37:6e:32:a8:d2:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 70:84:66:fe:19:c7:70:4c:88:b0:21:ee:b5:12:fc:7c: > 13:40:2b:83:3e:54:58:da:aa:cc:4e:92:3e:d7:be:8a: > 6c:c6:55:f5:4e:6c:5b:67:a1:10:a1:d9:66:3f:50:97: > 65:45:5d:e6:9e:9f:de:0d:cf:b7:b7:dd:58:78:cb:61: > a2:e3:07:3e:61:a9:f9:5c:34:0d:eb:a3:21:b2:ef:a8: > 95:e7:50:82:b6:0c:42:05:5c:ab:e4:29:bd:4c:fc:d9: > 8f:b7:73:15:d8:ea:50:2f:6c:9a:96:d2:f3:22:5b:bc: > f4:24:eb:7d:df:70:64:14:27:48:54:45:b4:fa:51:9c > Fingerprint (MD5): > 68:E9:DD:AE:DD:52:3C:E0:7C:49:31:97:24:04:D0:42 > Fingerprint (SHA1): > A8:A3:D0:06:34:A4:56:56:03:CA:61:B8:B2:06:77:CB:92:D3:4F:6F >Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" >Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" >Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" >Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" >Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" >Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" >Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" >Returned value is 0, expected result is pass >chains.sh: #1958: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1959: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Creating DB RootDB >certutil -N -d RootDB -f RootDB/dbpasswd >chains.sh: #1960: explicitPolicy: Creating DB RootDB - PASSED >chains.sh: Creating Root CA Root >certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171685 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #1961: explicitPolicy: Creating Root CA Root - PASSED >chains.sh: Exporting Root CA Root.der >certutil -L -d RootDB -r -n Root -o Root.der >chains.sh: #1962: explicitPolicy: Exporting Root CA Root.der - PASSED >chains.sh: Creating DB nonEVCADB >certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd >chains.sh: #1963: explicitPolicy: Creating DB nonEVCADB - PASSED >chains.sh: Creating Intermediate certifiate request nonEVCAReq.der >certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1964: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED >chains.sh: Creating certficate nonEVCARoot.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 306171686 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #1965: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED >chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database >certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der >chains.sh: #1966: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED >chains.sh: Creating DB EVCADB >certutil -N -d EVCADB -f EVCADB/dbpasswd >chains.sh: #1967: explicitPolicy: Creating DB EVCADB - PASSED >chains.sh: Creating Intermediate certifiate request EVCAReq.der >certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1968: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED >chains.sh: Creating certficate EVCARoot.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 306171687 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1969: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED >chains.sh: Importing certificate EVCARoot.der to EVCADB database >certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der >chains.sh: #1970: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED >chains.sh: Creating DB otherEVCADB >certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd >chains.sh: #1971: explicitPolicy: Creating DB otherEVCADB - PASSED >chains.sh: Creating Intermediate certifiate request otherEVCAReq.der >certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1972: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED >chains.sh: Creating certficate otherEVCARoot.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 306171688 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.2.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1973: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED >chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database >certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der >chains.sh: #1974: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED >chains.sh: Creating DB validEVDB >certutil -N -d validEVDB -f validEVDB/dbpasswd >chains.sh: #1975: explicitPolicy: Creating DB validEVDB - PASSED >chains.sh: Creating EE certifiate request validEVReq.der >certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1976: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED >chains.sh: Creating certficate validEVEVCA.der signed by EVCA >certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 306171689 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1977: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED >chains.sh: Importing certificate validEVEVCA.der to validEVDB database >certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der >chains.sh: #1978: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED >chains.sh: Creating DB invalidEVDB >certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd >chains.sh: #1979: explicitPolicy: Creating DB invalidEVDB - PASSED >chains.sh: Creating EE certifiate request invalidEVReq.der >certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1980: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED >chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA >certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 306171690 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1981: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED >chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database >certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der >chains.sh: #1982: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED >chains.sh: Creating DB wrongEVOIDDB >certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd >chains.sh: #1983: explicitPolicy: Creating DB wrongEVOIDDB - PASSED >chains.sh: Creating EE certifiate request wrongEVOIDReq.der >certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #1984: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED >chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA >certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 306171691 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #1985: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED >chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database >certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der >chains.sh: #1986: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #1987: explicitPolicy: Creating DB AllDB - PASSED >chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der >vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171685 (0x123fcf25) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:31 2013 > Not After : Wed Mar 07 00:16:31 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c2:25:4d:7a:87:fa:c9:7c:68:1d:f9:34:18:6d:58:fa: > 4b:1b:a4:ba:e5:2a:0b:ef:39:d6:5f:51:6b:e5:e3:6b: > 90:3a:4e:1b:66:5f:69:7e:42:08:ea:f1:27:17:46:ae: > 97:93:06:1a:28:1b:62:71:b3:fd:24:f0:f5:b9:98:3b: > 00:57:e6:07:b4:f3:a2:12:bf:01:c9:65:8a:50:47:d5: > 6b:9c:6f:a0:29:83:b2:e2:51:97:dc:98:ab:14:89:4d: > cd:75:80:34:84:fc:4c:a6:98:4a:92:40:0c:dd:87:c6: > fe:ad:f0:d2:71:95:9d:b4:9a:7e:5e:b0:cd:59:03:33 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 8a:fe:76:a6:ab:33:6c:74:76:de:54:0d:2d:8c:c8:4a: > 9b:9a:cf:5f:fd:d3:99:5b:f1:2f:9d:a4:cf:6a:54:3b: > 8a:b3:cf:a4:55:1c:d3:7d:0a:81:5b:3a:13:c6:dc:15: > 54:70:fd:07:42:ec:48:0f:77:8b:6e:a9:fe:d2:53:1e: > c4:38:10:d8:39:05:ab:a8:da:74:e5:cb:85:2b:4d:5f: > 61:af:3a:f8:13:1c:1c:20:98:d5:ce:d0:98:47:90:b4: > 7e:25:eb:ad:0a:8a:87:c3:f9:4a:04:f9:e1:5e:c3:ca: > e3:b4:81:e4:6d:f4:1b:f5:66:e3:77:a2:aa:a0:43:21 > Fingerprint (MD5): > 79:7B:80:FD:7E:44:A6:F2:5D:C6:1F:76:D4:F7:95:17 > Fingerprint (SHA1): > 49:76:52:C5:FE:09:B0:0C:B3:30:7D:05:BC:D6:16:07:F8:60:68:3D >Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" >Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" >Returned value is 0, expected result is pass >chains.sh: #1988: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED >chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der >vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1989: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED >chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der >vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1990: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED >chains.sh: Importing certificate Root.der to AllDB database >certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der >chains.sh: #1991: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED >chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 >vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171685 (0x123fcf25) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:31 2013 > Not After : Wed Mar 07 00:16:31 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c2:25:4d:7a:87:fa:c9:7c:68:1d:f9:34:18:6d:58:fa: > 4b:1b:a4:ba:e5:2a:0b:ef:39:d6:5f:51:6b:e5:e3:6b: > 90:3a:4e:1b:66:5f:69:7e:42:08:ea:f1:27:17:46:ae: > 97:93:06:1a:28:1b:62:71:b3:fd:24:f0:f5:b9:98:3b: > 00:57:e6:07:b4:f3:a2:12:bf:01:c9:65:8a:50:47:d5: > 6b:9c:6f:a0:29:83:b2:e2:51:97:dc:98:ab:14:89:4d: > cd:75:80:34:84:fc:4c:a6:98:4a:92:40:0c:dd:87:c6: > fe:ad:f0:d2:71:95:9d:b4:9a:7e:5e:b0:cd:59:03:33 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 8a:fe:76:a6:ab:33:6c:74:76:de:54:0d:2d:8c:c8:4a: > 9b:9a:cf:5f:fd:d3:99:5b:f1:2f:9d:a4:cf:6a:54:3b: > 8a:b3:cf:a4:55:1c:d3:7d:0a:81:5b:3a:13:c6:dc:15: > 54:70:fd:07:42:ec:48:0f:77:8b:6e:a9:fe:d2:53:1e: > c4:38:10:d8:39:05:ab:a8:da:74:e5:cb:85:2b:4d:5f: > 61:af:3a:f8:13:1c:1c:20:98:d5:ce:d0:98:47:90:b4: > 7e:25:eb:ad:0a:8a:87:c3:f9:4a:04:f9:e1:5e:c3:ca: > e3:b4:81:e4:6d:f4:1b:f5:66:e3:77:a2:aa:a0:43:21 > Fingerprint (MD5): > 79:7B:80:FD:7E:44:A6:F2:5D:C6:1F:76:D4:F7:95:17 > Fingerprint (SHA1): > 49:76:52:C5:FE:09:B0:0C:B3:30:7D:05:BC:D6:16:07:F8:60:68:3D > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" >Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" >Returned value is 0, expected result is pass >chains.sh: #1992: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED >chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 >vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. Root [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1993: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED >chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 >vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. Root [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #1994: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED >chains.sh: Creating DB RootDB >certutil -N -d RootDB -f RootDB/dbpasswd >chains.sh: #1995: Mapping: Creating DB RootDB - PASSED >chains.sh: Creating Root CA Root >certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171692 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #1996: Mapping: Creating Root CA Root - PASSED >chains.sh: Exporting Root CA Root.der >certutil -L -d RootDB -r -n Root -o Root.der >chains.sh: #1997: Mapping: Exporting Root CA Root.der - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #1998: Mapping: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #1999: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 306171693 --extCP --extPM < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >OID.1.0 >OID.1.1 >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] >Is this a critical extension [y/N]? >chains.sh: #2000: Mapping: Creating certficate CA1Root.der signed by Root - PASSED >chains.sh: Importing certificate CA1Root.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der >chains.sh: #2001: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #2002: Mapping: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2003: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 306171694 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.1 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #2004: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA2CA1.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der >chains.sh: #2005: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED >chains.sh: Creating DB UserDB >certutil -N -d UserDB -f UserDB/dbpasswd >chains.sh: #2006: Mapping: Creating DB UserDB - PASSED >chains.sh: Creating EE certifiate request UserReq.der >certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #2007: Mapping: Creating EE certifiate request UserReq.der - PASSED >chains.sh: Creating certficate UserCA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 306171695 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.1 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #2008: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED >chains.sh: Importing certificate UserCA2.der to UserDB database >certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der >chains.sh: #2009: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #2010: Mapping: Creating DB AllDB - PASSED >chains.sh: Importing certificate Root.der to AllDB database >certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der >chains.sh: #2011: Mapping: Importing certificate Root.der to AllDB database - PASSED >chains.sh: Importing certificate CA1Root.der to AllDB database >certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der >chains.sh: #2012: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED >chains.sh: Importing certificate CA2CA1.der to AllDB database >certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der >chains.sh: #2013: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171692 (0x123fcf2c) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:33 2013 > Not After : Wed Mar 07 00:16:33 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ce:58:68:73:f6:9b:b6:cc:59:ba:79:8c:12:73:e6:43: > 19:81:9a:23:39:c2:4c:2c:9a:94:5c:d7:93:d1:46:b1: > 7b:73:2f:41:65:6a:87:47:ca:fd:1e:88:37:0a:f9:5c: > 8e:65:df:75:d9:ea:ca:e1:8f:d8:19:de:7a:51:69:9d: > 91:fe:a8:8b:3d:e2:9f:a7:5d:97:19:37:b5:7b:6b:85: > 6c:08:48:31:7a:2e:99:96:41:46:01:2b:e2:3a:58:d2: > 1d:67:56:fd:c4:68:b8:f2:02:1c:b9:03:05:3a:af:36: > 29:ff:19:8f:9b:e3:a2:df:97:70:d3:94:3a:c7:93:cd > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 0f:1f:51:1a:d8:08:9b:5a:8f:73:ce:a6:5d:84:4d:7a: > 08:f6:df:80:6f:9a:d1:26:b4:7d:10:a6:cd:3e:04:84: > 23:90:df:ca:b6:43:46:eb:e8:93:b3:a4:0b:2f:6d:2a: > 38:ee:a0:85:a6:83:fe:30:b4:6a:25:28:1d:bc:a7:b5: > 64:88:02:4c:1a:6f:2a:57:e2:eb:0e:f4:61:bb:e4:e5: > 93:a0:d4:b8:13:55:f0:c0:22:ee:ff:0e:af:b0:0a:e7: > ce:c6:c0:97:fc:c1:7c:66:32:35:dc:94:96:60:6b:66: > 11:54:0b:ea:3c:d9:e4:7c:d7:1c:4f:d9:6c:33:5b:94 > Fingerprint (MD5): > CB:5B:CF:9F:BE:EE:0E:B8:8B:C1:C5:52:A0:F3:08:AA > Fingerprint (SHA1): > 80:7E:CD:B9:38:38:BD:A1:17:DA:8C:D8:50:40:87:11:BE:49:00:3A > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #2014: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root >vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. Root [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2015: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. CA1 [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2016: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 >vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171693 (0x123fcf2d) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:33 2013 > Not After : Wed Mar 07 00:16:33 2018 > Subject: "CN=CA1 Intermediate,O=CA1,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c0:d4:dc:1a:b1:05:53:8e:06:5e:9b:f1:fc:68:90:a2: > 94:7c:c5:89:1f:7f:ab:04:4b:1e:37:f0:64:05:7d:dd: > 43:5e:37:3c:e0:ff:13:aa:29:49:52:77:8d:ca:ef:b6: > fb:8a:1f:55:ca:e4:2f:41:dc:84:cc:83:8b:19:46:8a: > 8c:87:96:91:cc:64:d3:2e:47:f0:72:94:de:5c:4d:7b: > c3:93:88:b6:04:ed:68:9f:a6:24:ab:01:fc:8c:92:99: > 1a:c2:d5:d1:16:c8:c3:37:9d:f9:02:17:a6:51:cd:2f: > 96:d6:60:25:03:0a:9e:12:67:a7:a7:73:7d:af:16:01 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policy Mappings > Data: Sequence { > Sequence { > OID.1.0 > User Defined Policy OID > } > } > Name: Certificate Policies > Data: > Policy Name: OID.1.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 75:46:28:f2:fa:66:f0:23:f1:1c:4c:22:fa:2e:85:10: > ed:0c:af:49:f8:e7:6b:07:ac:74:ab:1f:6a:bb:8b:4b: > 85:c7:7c:71:ef:55:77:66:5b:1c:42:ea:ff:6e:05:eb: > ab:29:17:d8:5b:92:43:b9:ce:79:a6:b3:14:52:24:d7: > c2:d3:2e:9a:a7:a6:11:53:37:7e:00:72:f3:a3:db:df: > da:af:7c:32:da:16:be:c7:f6:33:27:b2:f3:f2:21:66: > 23:f4:da:81:89:89:93:8c:80:52:b9:95:5f:eb:de:05: > 35:d1:98:7b:03:51:b9:f5:05:dd:b1:a2:ac:ff:98:be > Fingerprint (MD5): > CB:44:52:FC:81:7D:D7:50:60:AF:9D:6E:E2:7D:B4:8C > Fingerprint (SHA1): > C2:5E:99:5D:22:72:65:32:6C:63:90:F5:D9:5B:C9:2B:33:0E:E4:EC > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Returned value is 0, expected result is pass >chains.sh: #2017: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. CA2 [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2018: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 >vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171694 (0x123fcf2e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:16:33 2013 > Not After : Wed Mar 07 00:16:33 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > cc:5f:72:7b:27:47:6f:6e:b8:84:8f:9e:f4:34:4c:05: > 75:89:f8:5d:5d:bd:6e:ab:d9:83:57:a6:40:10:e2:27: > b5:43:21:16:2a:81:c2:fe:d2:64:9c:5e:fd:f7:32:bb: > 3d:01:e0:44:8a:b5:d1:7e:e1:d1:3a:20:da:25:6d:80: > fd:17:32:57:5a:34:2e:af:9b:bd:37:b7:b9:fe:80:2b: > 24:63:eb:ac:f7:94:f0:a7:23:02:c9:31:2d:c5:7a:fe: > e5:73:d6:d0:fe:d9:48:67:81:fb:cd:17:cb:23:b0:7e: > be:64:b9:8e:34:6e:02:a5:1b:83:c1:46:36:fa:f5:f5 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 51:5d:e9:0f:73:79:b2:72:53:fb:45:99:c9:a1:d3:4b: > 8a:49:d4:59:38:ec:ba:e4:13:78:e1:2c:2f:d3:04:ea: > 80:29:ff:8f:20:e7:f2:b3:a2:aa:52:02:b8:e1:b2:9d: > bd:b6:94:7b:ea:78:58:23:97:c4:27:67:c4:7f:34:99: > ae:6a:b8:16:60:66:76:3c:b6:86:c5:ba:27:ba:44:29: > 4d:bf:b0:f7:62:d2:70:94:73:9d:2c:e6:e8:a5:40:09: > 6a:26:b5:4c:91:6f:7c:e9:9d:9d:c4:83:5b:16:a6:42: > 70:e8:ef:e6:ad:3b:93:af:cb:db:73:df:40:57:ee:f1 > Fingerprint (MD5): > AB:BC:02:BE:23:96:34:FA:AE:09:75:F0:D2:D6:F2:3F > Fingerprint (SHA1): > 47:19:C7:7E:2B:28:61:29:1F:29:D7:D6:0C:18:38:B1:CA:CA:C9:4D > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Returned value is 0, expected result is pass >chains.sh: #2019: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED >chains.sh: Creating DB RootDB >certutil -N -d RootDB -f RootDB/dbpasswd >chains.sh: #2020: Mapping2: Creating DB RootDB - PASSED >chains.sh: Creating Root CA Root >certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171696 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #2021: Mapping2: Creating Root CA Root - PASSED >chains.sh: Exporting Root CA Root.der >certutil -L -d RootDB -r -n Root -o Root.der >chains.sh: #2022: Mapping2: Exporting Root CA Root.der - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #2023: Mapping2: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2024: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 306171697 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #2025: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED >chains.sh: Importing certificate CA1Root.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der >chains.sh: #2026: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #2027: Mapping2: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2028: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 306171698 --extCP --extPM < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >OID.1.0 >OID.1.1 >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] >Is this a critical extension [y/N]? >chains.sh: #2029: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA2CA1.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der >chains.sh: #2030: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED >chains.sh: Creating DB CA3DB >certutil -N -d CA3DB -f CA3DB/dbpasswd >chains.sh: #2031: Mapping2: Creating DB CA3DB - PASSED >chains.sh: Creating Intermediate certifiate request CA3Req.der >certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2032: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED >chains.sh: Creating certficate CA3CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 306171699 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.1 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #2033: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate CA3CA2.der to CA3DB database >certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der >chains.sh: #2034: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED >chains.sh: Creating DB UserDB >certutil -N -d UserDB -f UserDB/dbpasswd >chains.sh: #2035: Mapping2: Creating DB UserDB - PASSED >chains.sh: Creating EE certifiate request UserReq.der >certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #2036: Mapping2: Creating EE certifiate request UserReq.der - PASSED >chains.sh: Creating certficate UserCA3.der signed by CA3 >certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 306171700 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.1 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #2037: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED >chains.sh: Importing certificate UserCA3.der to UserDB database >certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der >chains.sh: #2038: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #2039: Mapping2: Creating DB AllDB - PASSED >chains.sh: Importing certificate Root.der to AllDB database >certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der >chains.sh: #2040: Mapping2: Importing certificate Root.der to AllDB database - PASSED >chains.sh: Importing certificate CA1Root.der to AllDB database >certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der >chains.sh: #2041: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED >chains.sh: Importing certificate CA2CA1.der to AllDB database >certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der >chains.sh: #2042: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED >chains.sh: Importing certificate CA3CA2.der to AllDB database >certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der >chains.sh: #2043: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED >chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171696 (0x123fcf30) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:34 2013 > Not After : Wed Mar 07 00:16:34 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bd:fc:7b:49:f0:9c:72:4b:b4:ac:1f:21:c8:09:cd:b3: > c3:46:6b:7f:27:54:16:8a:a3:e0:a2:38:34:fd:39:ec: > 0c:12:d3:f8:5b:70:f1:41:08:db:a8:c7:a1:de:e9:30: > 8b:1e:52:93:50:a8:c4:aa:1f:6e:ee:a3:11:79:30:86: > 56:11:d1:60:ab:b0:86:42:50:19:47:c3:a6:4f:f5:43: > 13:68:12:d8:7f:43:89:e0:e0:16:e8:03:f3:89:f4:40: > 57:3b:05:2e:8c:aa:de:e5:f9:24:5e:4b:93:73:f8:30: > 05:a2:f8:18:c3:5f:36:24:df:23:18:85:a6:c0:00:1b > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 57:b6:e1:04:26:c9:57:4d:fa:8e:3d:10:be:37:73:1b: > 4d:45:ca:53:38:45:76:a3:e9:99:ac:68:00:d4:c2:77: > 53:93:0b:fe:3b:23:6d:73:f0:f2:96:d4:19:df:ff:2f: > 64:b1:50:4a:7a:81:a4:d4:b9:5f:8e:4d:5f:0a:25:41: > a3:4f:e9:57:52:74:37:5e:b3:1e:65:24:c6:ca:ae:ba: > ab:31:8e:fb:56:0a:4a:2a:47:5e:e9:69:1d:9b:45:05: > ad:e3:f1:8a:47:b7:53:2e:d4:d4:09:35:79:22:06:36: > 2b:35:30:9b:9d:11:7b:6d:82:51:85:94:40:89:df:e5 > Fingerprint (MD5): > 29:6E:28:88:37:96:D0:D5:CE:E4:EE:5D:50:04:A7:E1 > Fingerprint (SHA1): > D2:82:A5:E0:31:2E:5A:82:B4:6A:DE:E7:EB:89:43:7D:ED:E8:A1:20 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" >Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #2044: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root - PASSED >chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root >vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. Root [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2045: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root - PASSED >chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171697 (0x123fcf31) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:34 2013 > Not After : Wed Mar 07 00:16:34 2018 > Subject: "CN=CA1 Intermediate,O=CA1,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bc:4b:50:e5:18:77:d7:df:d5:5f:25:47:54:07:15:41: > 3a:55:df:f8:a2:0d:a7:30:c9:ad:cf:8f:cc:f6:ec:81: > ad:cd:a0:59:13:c5:fd:4c:c0:a5:39:1a:b0:75:35:b1: > fa:d1:f2:d2:9e:34:a0:c5:b8:87:01:68:3b:0a:5b:67: > 56:7e:6f:b6:6d:a7:7e:07:af:ad:66:d7:64:03:f6:cb: > 03:cc:44:db:0e:0c:d8:73:92:b2:7b:f6:c1:ce:d8:58: > b2:97:40:b8:4d:e6:b7:e3:d3:8d:df:09:39:3d:87:14: > 28:76:32:bd:46:28:1e:3b:9f:36:6e:5d:54:b9:76:77 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 77:8f:3e:35:de:57:fc:94:1d:58:32:a7:24:38:22:3d: > e1:43:6a:cc:7e:74:09:c9:9d:7c:71:bc:e2:3d:4b:78: > 1b:49:39:30:e2:a7:9d:ce:1d:d8:39:0b:98:2e:0c:ea: > 9c:96:65:01:e8:ea:d3:ae:27:82:98:fb:3b:e0:57:53: > 5e:6b:d9:3c:ed:9a:30:40:0c:d8:e2:47:15:9a:70:cd: > 12:fb:1e:df:f6:0d:70:82:2b:e7:87:06:1f:4f:4f:fc: > 04:ed:c6:77:8a:4b:2c:81:22:fd:25:d2:54:ba:12:bb: > ef:14:a2:6c:9a:cf:6e:0b:da:cd:5b:00:c6:82:c0:79 > Fingerprint (MD5): > BB:4F:3E:96:0C:64:F0:4C:FE:55:15:20:77:9D:37:FD > Fingerprint (SHA1): > 80:F3:39:FE:30:66:F3:B1:D0:5E:3D:E3:4A:A3:28:7B:41:26:AF:41 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" >Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Returned value is 0, expected result is pass >chains.sh: #2046: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED >chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 >vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. CA1 [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2047: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED >chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. CA2 [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2048: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED >chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 >vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171698 (0x123fcf32) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:16:35 2013 > Not After : Wed Mar 07 00:16:35 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > cc:2a:f5:7c:5c:41:26:ea:93:e5:c4:76:4f:70:ef:6b: > 25:39:a2:fe:22:86:5c:27:60:a4:fc:9c:5d:3f:ce:d6: > 6e:84:41:28:db:cd:88:7c:b2:24:2b:fa:e3:d3:4c:35: > 30:e1:0a:6a:47:1e:4a:2a:0d:e0:69:6a:84:70:fe:c9: > 90:de:c2:87:a3:4c:22:c2:89:93:de:77:44:4d:59:1e: > a5:3a:2f:48:1e:a7:e5:b7:e7:50:06:88:14:c2:91:36: > e5:df:b6:63:eb:93:b6:57:dd:08:ba:38:20:c7:c5:1e: > b5:4e:a6:44:c7:b0:61:b2:61:b1:63:26:49:f3:20:65 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policy Mappings > Data: Sequence { > Sequence { > OID.1.0 > User Defined Policy OID > } > } > Name: Certificate Policies > Data: > Policy Name: OID.1.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2b:3a:4b:2e:1d:53:4a:03:42:93:73:79:16:8b:6e:51: > 80:97:99:71:02:51:86:5f:d9:76:d6:2b:d5:37:09:fe: > 99:95:ac:f8:49:8d:29:7b:73:28:f9:44:f4:7c:fe:62: > 9b:68:5f:1d:8c:30:bb:5a:50:65:03:49:c9:c0:9c:26: > d7:7b:7f:27:ae:39:ef:36:ff:6f:82:af:38:84:03:be: > a3:bf:d1:8c:89:ee:ed:ad:00:8d:d4:7c:0d:46:b4:37: > e4:11:e7:d5:2d:33:8f:65:df:ef:65:68:e0:f2:f5:a2: > 3e:c3:47:f3:a3:84:5c:0e:23:b5:ec:24:c3:35:0a:90 > Fingerprint (MD5): > 2E:6E:7B:FC:D5:24:F5:04:AE:36:E7:6F:05:B0:E9:8E > Fingerprint (SHA1): > 2D:D8:E7:D7:F3:08:54:28:D1:2B:5F:EE:82:DC:3B:91:50:EF:88:49 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" >Returned value is 0, expected result is pass >chains.sh: #2049: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED >chains.sh: Creating DB RootDB >certutil -N -d RootDB -f RootDB/dbpasswd >chains.sh: #2050: AIA: Creating DB RootDB - PASSED >chains.sh: Creating Root CA Root >certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171701 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #2051: AIA: Creating Root CA Root - PASSED >chains.sh: Exporting Root CA Root.der >certutil -L -d RootDB -r -n Root -o Root.der >chains.sh: #2052: AIA: Exporting Root CA Root.der - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #2053: AIA: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2054: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 306171702 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2055: AIA: Creating certficate CA1Root.der signed by Root - PASSED >chains.sh: Importing certificate CA1Root.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der >chains.sh: #2056: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #2057: AIA: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2058: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 306171703 --extAIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA1Root-306171611.der >0 >n >n >=== >Enter access method type for Authority Information Access extension: > 1 - CA Issuers > 2 - OCSP > Anyother number to finish > Choice > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Add another location to the Authority Information Access extension [y/N] >Is this a critical extension [y/N]? >chains.sh: #2059: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA2CA1.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der >chains.sh: #2060: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED >chains.sh: Creating DB UserDB >certutil -N -d UserDB -f UserDB/dbpasswd >chains.sh: #2061: AIA: Creating DB UserDB - PASSED >chains.sh: Creating EE certifiate request UserReq.der >certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #2062: AIA: Creating EE certifiate request UserReq.der - PASSED >chains.sh: Creating certficate UserCA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 306171704 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2063: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED >chains.sh: Importing certificate UserCA2.der to UserDB database >certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der >chains.sh: #2064: AIA: Importing certificate UserCA2.der to UserDB database - PASSED >chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der >vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=CA1 Intermediate,O=CA1,C=US >Returned value is 1, expected result is fail >chains.sh: #2065: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der - PASSED >chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -f -t Root.der >vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171701 (0x123fcf35) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:36 2013 > Not After : Wed Mar 07 00:16:36 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:fe:48:67:10:b9:4d:84:d2:5d:52:81:29:a9:1d:73: > 1d:83:b5:91:0c:6e:14:60:2c:82:4f:2a:b8:0e:5b:51: > ed:2c:3b:86:ce:1b:48:85:aa:6c:a2:a3:6d:a8:f9:18: > 40:41:55:bb:a0:12:54:dc:ab:73:81:b3:31:3d:07:b7: > f3:17:af:ed:2e:8c:7e:40:32:57:10:f2:7e:87:ad:cf: > 86:2b:cb:62:8e:f1:12:89:89:32:fd:c2:9e:c6:aa:51: > 59:66:9a:16:31:d7:ea:ac:33:f7:8d:4c:f5:6d:42:9f: > 53:41:5d:8b:70:e7:29:e9:67:13:d0:a9:5f:16:47:8f > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 45:a2:c1:fe:7c:33:8c:89:17:fc:44:d6:aa:50:71:7c: > a2:63:9a:a6:36:86:0a:de:a4:a4:4a:ad:8d:c7:8e:a4: > f0:72:cb:87:2b:d5:2a:c8:60:b1:76:26:aa:93:e3:1a: > 95:78:20:6a:f0:23:fa:81:10:39:7a:08:2d:b2:9c:58: > b6:24:ad:76:10:6e:f0:43:ef:ac:f3:8a:9b:91:cb:9a: > 95:8c:a5:87:3c:86:d3:8c:65:e2:e3:6d:c6:84:36:b7: > 70:3e:19:ca:bb:3e:c4:f3:78:26:e9:e5:08:5d:62:3c: > 9e:40:5a:ab:c6:27:3a:5e:f5:7f:dc:3a:a1:ab:2a:db > Fingerprint (MD5): > 62:EC:87:37:25:B8:BA:CC:1D:E5:BA:F3:FD:AB:39:59 > Fingerprint (SHA1): > 20:89:63:DE:81:87:A4:DF:5D:F3:6F:04:BD:AE:89:C6:7F:0B:76:92 >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #2066: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -f -t Root.der - PASSED >chains.sh: Creating DB ArmyDB >certutil -N -d ArmyDB -f ArmyDB/dbpasswd >chains.sh: #2067: BridgeWithAIA: Creating DB ArmyDB - PASSED >chains.sh: Creating Root CA Army >certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171705 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #2068: BridgeWithAIA: Creating Root CA Army - PASSED >chains.sh: Exporting Root CA Army.der >certutil -L -d ArmyDB -r -n Army -o Army.der >chains.sh: #2069: BridgeWithAIA: Exporting Root CA Army.der - PASSED >chains.sh: Creating DB NavyDB >certutil -N -d NavyDB -f NavyDB/dbpasswd >chains.sh: #2070: BridgeWithAIA: Creating DB NavyDB - PASSED >chains.sh: Creating Root CA Navy >certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171706 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #2071: BridgeWithAIA: Creating Root CA Navy - PASSED >chains.sh: Exporting Root CA Navy.der >certutil -L -d NavyDB -r -n Navy -o Navy.der >chains.sh: #2072: BridgeWithAIA: Exporting Root CA Navy.der - PASSED >chains.sh: Creating DB BridgeDB >certutil -N -d BridgeDB -f BridgeDB/dbpasswd >chains.sh: #2073: BridgeWithAIA: Creating DB BridgeDB - PASSED >chains.sh: Creating Bridge certifiate request BridgeReq.der >certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2074: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED >chains.sh: Creating certficate BridgeArmy.der signed by Army >certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 306171707 -7 Bridge@Army < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2075: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED >chains.sh: Importing certificate BridgeArmy.der to BridgeDB database >certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der >chains.sh: #2076: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED >chains.sh: Creating certficate BridgeNavy.der signed by Navy >certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 306171708 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2077: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED >chains.sh: Importing certificate BridgeNavy.der to BridgeDB database >certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der >chains.sh: #2078: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED >chains.sh: Generating PKCS7 package from BridgeDB database >cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 >chains.sh: #2079: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #2080: BridgeWithAIA: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2081: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Bridge.der signed by Bridge >certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 306171709 --extAIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-Bridge-306171612.p7 >0 >n >n >=== >Enter access method type for Authority Information Access extension: > 1 - CA Issuers > 2 - OCSP > Anyother number to finish > Choice > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Add another location to the Authority Information Access extension [y/N] >Is this a critical extension [y/N]? >chains.sh: #2082: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED >chains.sh: Importing certificate CA1Bridge.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der >chains.sh: #2083: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED >chains.sh: Creating DB EE1DB >certutil -N -d EE1DB -f EE1DB/dbpasswd >chains.sh: #2084: BridgeWithAIA: Creating DB EE1DB - PASSED >chains.sh: Creating EE certifiate request EE1Req.der >certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #2085: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED >chains.sh: Creating certficate EE1CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 306171710 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2086: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate EE1CA1.der to EE1DB database >certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der >chains.sh: #2087: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Bridge Bridge,O=Bridge,C=US >Returned value is 1, expected result is fail >chains.sh: #2088: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Army.der >vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. bridge@navy [Certificate Authority]: >Email Address(es): bridge@navy > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Navy ROOT CA,O=Navy,C=US > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Navy ROOT CA,O=Navy,C=US >Returned value is 1, expected result is fail >chains.sh: #2089: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Navy.der >vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171706 (0x123fcf3a) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:16:37 2013 > Not After : Wed Mar 07 00:16:37 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ab:f1:9e:42:2a:c2:be:bf:52:6b:a5:81:ea:c8:aa:82: > 25:74:26:5d:33:e6:ba:76:72:cc:a8:b2:ac:35:da:7e: > 1b:66:6c:2b:fa:29:0b:93:14:75:3c:01:92:19:9a:b7: > e7:0d:b2:99:31:e6:61:f1:83:fa:27:c6:f2:df:e7:a0: > 69:12:a3:c2:16:d1:61:e6:f5:09:e8:b5:bf:06:ec:83: > 62:6f:f2:24:37:3c:e2:c7:bb:3c:b0:3a:7e:2f:ae:73: > 19:d7:d2:ac:25:3a:17:a5:04:41:9a:c4:37:4b:d9:63: > 29:0d:5a:f2:a5:50:db:22:ef:62:73:d4:65:19:0a:cd > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 90:55:7f:4a:80:79:9f:4e:bb:2b:4a:06:94:45:5f:4f: > 51:99:1c:c8:7f:0a:12:d4:0e:7d:bb:3f:3a:ad:f5:61: > c2:25:ea:0d:80:a6:af:01:2c:50:cf:30:fc:29:49:60: > 38:92:87:f0:91:de:89:ae:9b:e0:cf:01:e2:aa:df:9b: > c5:ca:6c:5f:eb:8d:1a:90:02:0f:12:a7:0a:12:42:e0: > 5c:18:f4:ca:84:90:42:ed:da:8f:37:d8:ca:e9:88:ef: > 37:38:e3:6e:ef:5a:ff:bc:47:8c:6d:bb:26:78:ee:10: > 33:fc:4a:44:53:94:e3:40:a8:4e:6c:60:f9:e3:a1:99 > Fingerprint (MD5): > A3:0C:C3:8E:56:52:6F:C9:2E:4A:0D:34:5D:19:7D:5F > Fingerprint (SHA1): > 2A:A8:56:6C:0B:17:85:BB:60:F5:B3:21:77:BD:6A:AC:87:62:22:21 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #2090: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Navy.der >vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171706 (0x123fcf3a) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:16:37 2013 > Not After : Wed Mar 07 00:16:37 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ab:f1:9e:42:2a:c2:be:bf:52:6b:a5:81:ea:c8:aa:82: > 25:74:26:5d:33:e6:ba:76:72:cc:a8:b2:ac:35:da:7e: > 1b:66:6c:2b:fa:29:0b:93:14:75:3c:01:92:19:9a:b7: > e7:0d:b2:99:31:e6:61:f1:83:fa:27:c6:f2:df:e7:a0: > 69:12:a3:c2:16:d1:61:e6:f5:09:e8:b5:bf:06:ec:83: > 62:6f:f2:24:37:3c:e2:c7:bb:3c:b0:3a:7e:2f:ae:73: > 19:d7:d2:ac:25:3a:17:a5:04:41:9a:c4:37:4b:d9:63: > 29:0d:5a:f2:a5:50:db:22:ef:62:73:d4:65:19:0a:cd > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 90:55:7f:4a:80:79:9f:4e:bb:2b:4a:06:94:45:5f:4f: > 51:99:1c:c8:7f:0a:12:d4:0e:7d:bb:3f:3a:ad:f5:61: > c2:25:ea:0d:80:a6:af:01:2c:50:cf:30:fc:29:49:60: > 38:92:87:f0:91:de:89:ae:9b:e0:cf:01:e2:aa:df:9b: > c5:ca:6c:5f:eb:8d:1a:90:02:0f:12:a7:0a:12:42:e0: > 5c:18:f4:ca:84:90:42:ed:da:8f:37:d8:ca:e9:88:ef: > 37:38:e3:6e:ef:5a:ff:bc:47:8c:6d:bb:26:78:ee:10: > 33:fc:4a:44:53:94:e3:40:a8:4e:6c:60:f9:e3:a1:99 > Fingerprint (MD5): > A3:0C:C3:8E:56:52:6F:C9:2E:4A:0D:34:5D:19:7D:5F > Fingerprint (SHA1): > 2A:A8:56:6C:0B:17:85:BB:60:F5:B3:21:77:BD:6A:AC:87:62:22:21 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #2091: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Navy.der - PASSED >chains.sh: Creating DB ArmyDB >certutil -N -d ArmyDB -f ArmyDB/dbpasswd >chains.sh: #2092: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED >chains.sh: Creating Root CA Army >certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171711 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #2093: BridgeWithHalfAIA: Creating Root CA Army - PASSED >chains.sh: Exporting Root CA Army.der >certutil -L -d ArmyDB -r -n Army -o Army.der >chains.sh: #2094: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED >chains.sh: Creating DB NavyDB >certutil -N -d NavyDB -f NavyDB/dbpasswd >chains.sh: #2095: BridgeWithHalfAIA: Creating DB NavyDB - PASSED >chains.sh: Creating Root CA Navy >certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171712 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #2096: BridgeWithHalfAIA: Creating Root CA Navy - PASSED >chains.sh: Exporting Root CA Navy.der >certutil -L -d NavyDB -r -n Navy -o Navy.der >chains.sh: #2097: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED >chains.sh: Creating DB BridgeDB >certutil -N -d BridgeDB -f BridgeDB/dbpasswd >chains.sh: #2098: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED >chains.sh: Creating Bridge certifiate request BridgeReq.der >certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2099: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED >chains.sh: Creating certficate BridgeArmy.der signed by Army >certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 306171713 -7 Bridge@Army < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2100: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED >chains.sh: Importing certificate BridgeArmy.der to BridgeDB database >certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der >chains.sh: #2101: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED >chains.sh: Creating certficate BridgeNavy.der signed by Navy >certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 306171714 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2102: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED >chains.sh: Importing certificate BridgeNavy.der to BridgeDB database >certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der >chains.sh: #2103: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED >chains.sh: Generating PKCS7 package from BridgeDB database >cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 >chains.sh: #2104: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #2105: BridgeWithHalfAIA: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2106: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Bridge.der signed by Bridge >certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 306171715 --extAIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-Bridge-306171613.p7 >0 >n >n >=== >Enter access method type for Authority Information Access extension: > 1 - CA Issuers > 2 - OCSP > Anyother number to finish > Choice > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Add another location to the Authority Information Access extension [y/N] >Is this a critical extension [y/N]? >chains.sh: #2107: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED >chains.sh: Importing certificate CA1Bridge.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der >chains.sh: #2108: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED >chains.sh: Creating DB EE1DB >certutil -N -d EE1DB -f EE1DB/dbpasswd >chains.sh: #2109: BridgeWithHalfAIA: Creating DB EE1DB - PASSED >chains.sh: Creating EE certifiate request EE1Req.der >certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #2110: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED >chains.sh: Creating certficate EE1CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 306171716 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2111: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate EE1CA1.der to EE1DB database >certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der >chains.sh: #2112: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #2113: BridgeWithHalfAIA: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2114: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2Bridge.der signed by Bridge >certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 306171717 --extAIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-BridgeNavy-306171614.der >0 >n >n >=== >Enter access method type for Authority Information Access extension: > 1 - CA Issuers > 2 - OCSP > Anyother number to finish > Choice > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Add another location to the Authority Information Access extension [y/N] >Is this a critical extension [y/N]? >chains.sh: #2115: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED >chains.sh: Importing certificate CA2Bridge.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der >chains.sh: #2116: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED >chains.sh: Creating DB EE2DB >certutil -N -d EE2DB -f EE2DB/dbpasswd >chains.sh: #2117: BridgeWithHalfAIA: Creating DB EE2DB - PASSED >chains.sh: Creating EE certifiate request EE2Req.der >certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #2118: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED >chains.sh: Creating certficate EE2CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 306171718 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2119: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate EE2CA2.der to EE2DB database >certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der >chains.sh: #2120: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Bridge Bridge,O=Bridge,C=US >Returned value is 1, expected result is fail >chains.sh: #2121: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Army.der >vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. bridge@navy [Certificate Authority]: >Email Address(es): bridge@navy > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Navy ROOT CA,O=Navy,C=US > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Navy ROOT CA,O=Navy,C=US >Returned value is 1, expected result is fail >chains.sh: #2122: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Navy.der >vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171712 (0x123fcf40) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:16:38 2013 > Not After : Wed Mar 07 00:16:38 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d3:b4:af:af:b7:65:2a:4e:d3:44:2e:10:5b:3e:89:1e: > b2:03:6a:c6:71:36:07:b1:7a:b0:4a:7d:64:8f:81:ec: > e6:db:9c:46:78:6c:b5:eb:1e:58:4c:40:2b:b2:1d:24: > 85:0d:a7:83:7b:bf:2d:e4:d8:bf:f4:81:08:a7:c5:d6: > d8:26:92:dd:bc:bf:6e:12:7c:55:de:bb:be:0f:a1:de: > 32:7e:4c:01:a4:26:b2:0b:66:52:eb:2f:60:19:6e:8c: > 21:4e:4d:b1:40:19:c5:48:90:5e:1b:82:f4:ca:07:e8: > 30:d6:aa:ec:d5:6a:00:07:9e:d0:69:4e:62:5f:f6:6f > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 88:ec:49:d9:7c:bc:4b:bb:99:2c:0b:8b:b6:b6:43:98: > 2c:92:37:6c:a6:83:18:04:c8:a9:33:a5:cf:08:bd:65: > 5e:6d:b5:21:c4:38:a5:50:c5:11:a7:48:1a:2a:cb:39: > 56:2b:d2:49:d4:42:60:25:f5:8b:71:ac:2e:09:ed:8f: > 5f:7b:3f:14:22:b8:d8:fd:b6:69:20:93:c4:f0:f6:98: > ce:71:92:a0:9d:d7:45:a6:77:03:7b:a4:f4:5d:ae:35: > 7a:c6:76:90:69:d6:ae:84:30:20:0e:39:97:56:b1:86: > 61:42:28:41:1b:cf:89:30:65:4e:4a:f1:a3:79:62:50 > Fingerprint (MD5): > BA:F1:53:2A:C7:E2:21:5F:06:55:B5:C5:7A:31:29:A5 > Fingerprint (SHA1): > 88:9F:3F:C4:5E:FE:25:24:84:B6:15:8A:CC:D4:2E:8F:34:28:AE:24 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #2123: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Navy.der >vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171712 (0x123fcf40) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:16:38 2013 > Not After : Wed Mar 07 00:16:38 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d3:b4:af:af:b7:65:2a:4e:d3:44:2e:10:5b:3e:89:1e: > b2:03:6a:c6:71:36:07:b1:7a:b0:4a:7d:64:8f:81:ec: > e6:db:9c:46:78:6c:b5:eb:1e:58:4c:40:2b:b2:1d:24: > 85:0d:a7:83:7b:bf:2d:e4:d8:bf:f4:81:08:a7:c5:d6: > d8:26:92:dd:bc:bf:6e:12:7c:55:de:bb:be:0f:a1:de: > 32:7e:4c:01:a4:26:b2:0b:66:52:eb:2f:60:19:6e:8c: > 21:4e:4d:b1:40:19:c5:48:90:5e:1b:82:f4:ca:07:e8: > 30:d6:aa:ec:d5:6a:00:07:9e:d0:69:4e:62:5f:f6:6f > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 88:ec:49:d9:7c:bc:4b:bb:99:2c:0b:8b:b6:b6:43:98: > 2c:92:37:6c:a6:83:18:04:c8:a9:33:a5:cf:08:bd:65: > 5e:6d:b5:21:c4:38:a5:50:c5:11:a7:48:1a:2a:cb:39: > 56:2b:d2:49:d4:42:60:25:f5:8b:71:ac:2e:09:ed:8f: > 5f:7b:3f:14:22:b8:d8:fd:b6:69:20:93:c4:f0:f6:98: > ce:71:92:a0:9d:d7:45:a6:77:03:7b:a4:f4:5d:ae:35: > 7a:c6:76:90:69:d6:ae:84:30:20:0e:39:97:56:b1:86: > 61:42:28:41:1b:cf:89:30:65:4e:4a:f1:a3:79:62:50 > Fingerprint (MD5): > BA:F1:53:2A:C7:E2:21:5F:06:55:B5:C5:7A:31:29:A5 > Fingerprint (SHA1): > 88:9F:3F:C4:5E:FE:25:24:84:B6:15:8A:CC:D4:2E:8F:34:28:AE:24 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #2124: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -f -t Army.der >vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 0. CN=EE2 EE,O=EE2,C=US : > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=CA2 Intermediate,O=CA2,C=US >Returned value is 1, expected result is fail >chains.sh: #2125: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -f -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Army.der >vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171711 (0x123fcf3f) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Army ROOT CA,O=Army,C=US" > Validity: > Not Before: Thu Mar 07 00:16:38 2013 > Not After : Wed Mar 07 00:16:38 2063 > Subject: "CN=Army ROOT CA,O=Army,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > aa:b7:e6:07:1d:06:ce:bc:f3:ff:91:58:71:ed:8c:41: > 43:98:11:e4:84:a2:e2:c7:bc:1e:2c:08:0d:a8:ff:d4: > 2c:01:3d:f3:70:13:be:c4:fc:ad:60:a3:7c:8c:ac:42: > b9:e5:88:e3:06:a0:02:55:98:bd:ec:7e:15:b2:4c:10: > 2a:ce:a0:70:29:bd:35:a6:64:75:57:54:be:e5:f0:e7: > cc:db:5c:fc:1d:e2:ab:46:fa:cf:ef:e6:53:d6:ec:aa: > 28:52:e8:93:5f:1f:8d:43:72:f7:9d:f8:1d:18:b0:6b: > 5d:43:39:10:77:00:38:d8:16:d1:67:7f:75:f1:7b:df > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 5a:58:46:0e:2c:2d:fa:df:6e:6e:23:72:fa:b2:bc:bb: > be:10:85:cb:82:55:d5:c3:74:c0:2c:72:1c:a0:11:52: > 8b:3c:92:61:ac:9b:3e:45:22:e7:d0:49:49:26:d8:69: > 3d:f8:36:67:aa:e6:74:75:47:a2:45:67:f0:8f:2c:f9: > 1c:00:29:42:a2:e7:f3:43:4a:c5:e9:dd:35:71:1a:3e: > 2d:06:06:54:0a:5b:8a:b9:4a:d8:62:84:47:e4:b8:b0: > f0:f7:d6:28:88:37:07:fe:26:e3:52:2e:59:73:80:9a: > a4:af:54:18:73:93:c5:66:7e:ad:ba:d5:3b:2f:17:34 > Fingerprint (MD5): > FA:13:02:C3:C3:A2:6E:36:74:72:8D:ED:56:54:A1:25 > Fingerprint (SHA1): > 1D:55:DD:02:E9:9B:8B:E6:15:75:54:1B:C2:B6:49:79:9A:AD:89:16 >Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #2126: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -f -t Navy.der >vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171712 (0x123fcf40) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:16:38 2013 > Not After : Wed Mar 07 00:16:38 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d3:b4:af:af:b7:65:2a:4e:d3:44:2e:10:5b:3e:89:1e: > b2:03:6a:c6:71:36:07:b1:7a:b0:4a:7d:64:8f:81:ec: > e6:db:9c:46:78:6c:b5:eb:1e:58:4c:40:2b:b2:1d:24: > 85:0d:a7:83:7b:bf:2d:e4:d8:bf:f4:81:08:a7:c5:d6: > d8:26:92:dd:bc:bf:6e:12:7c:55:de:bb:be:0f:a1:de: > 32:7e:4c:01:a4:26:b2:0b:66:52:eb:2f:60:19:6e:8c: > 21:4e:4d:b1:40:19:c5:48:90:5e:1b:82:f4:ca:07:e8: > 30:d6:aa:ec:d5:6a:00:07:9e:d0:69:4e:62:5f:f6:6f > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 88:ec:49:d9:7c:bc:4b:bb:99:2c:0b:8b:b6:b6:43:98: > 2c:92:37:6c:a6:83:18:04:c8:a9:33:a5:cf:08:bd:65: > 5e:6d:b5:21:c4:38:a5:50:c5:11:a7:48:1a:2a:cb:39: > 56:2b:d2:49:d4:42:60:25:f5:8b:71:ac:2e:09:ed:8f: > 5f:7b:3f:14:22:b8:d8:fd:b6:69:20:93:c4:f0:f6:98: > ce:71:92:a0:9d:d7:45:a6:77:03:7b:a4:f4:5d:ae:35: > 7a:c6:76:90:69:d6:ae:84:30:20:0e:39:97:56:b1:86: > 61:42:28:41:1b:cf:89:30:65:4e:4a:f1:a3:79:62:50 > Fingerprint (MD5): > BA:F1:53:2A:C7:E2:21:5F:06:55:B5:C5:7A:31:29:A5 > Fingerprint (SHA1): > 88:9F:3F:C4:5E:FE:25:24:84:B6:15:8A:CC:D4:2E:8F:34:28:AE:24 >Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #2127: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -f -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Navy.der >vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171712 (0x123fcf40) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:16:38 2013 > Not After : Wed Mar 07 00:16:38 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d3:b4:af:af:b7:65:2a:4e:d3:44:2e:10:5b:3e:89:1e: > b2:03:6a:c6:71:36:07:b1:7a:b0:4a:7d:64:8f:81:ec: > e6:db:9c:46:78:6c:b5:eb:1e:58:4c:40:2b:b2:1d:24: > 85:0d:a7:83:7b:bf:2d:e4:d8:bf:f4:81:08:a7:c5:d6: > d8:26:92:dd:bc:bf:6e:12:7c:55:de:bb:be:0f:a1:de: > 32:7e:4c:01:a4:26:b2:0b:66:52:eb:2f:60:19:6e:8c: > 21:4e:4d:b1:40:19:c5:48:90:5e:1b:82:f4:ca:07:e8: > 30:d6:aa:ec:d5:6a:00:07:9e:d0:69:4e:62:5f:f6:6f > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 88:ec:49:d9:7c:bc:4b:bb:99:2c:0b:8b:b6:b6:43:98: > 2c:92:37:6c:a6:83:18:04:c8:a9:33:a5:cf:08:bd:65: > 5e:6d:b5:21:c4:38:a5:50:c5:11:a7:48:1a:2a:cb:39: > 56:2b:d2:49:d4:42:60:25:f5:8b:71:ac:2e:09:ed:8f: > 5f:7b:3f:14:22:b8:d8:fd:b6:69:20:93:c4:f0:f6:98: > ce:71:92:a0:9d:d7:45:a6:77:03:7b:a4:f4:5d:ae:35: > 7a:c6:76:90:69:d6:ae:84:30:20:0e:39:97:56:b1:86: > 61:42:28:41:1b:cf:89:30:65:4e:4a:f1:a3:79:62:50 > Fingerprint (MD5): > BA:F1:53:2A:C7:E2:21:5F:06:55:B5:C5:7A:31:29:A5 > Fingerprint (SHA1): > 88:9F:3F:C4:5E:FE:25:24:84:B6:15:8A:CC:D4:2E:8F:34:28:AE:24 >Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #2128: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Navy.der - PASSED >chains.sh: Creating DB ArmyDB >certutil -N -d ArmyDB -f ArmyDB/dbpasswd >chains.sh: #2129: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED >chains.sh: Creating Root CA Army >certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171719 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #2130: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED >chains.sh: Exporting Root CA Army.der >certutil -L -d ArmyDB -r -n Army -o Army.der >chains.sh: #2131: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED >chains.sh: Creating DB NavyDB >certutil -N -d NavyDB -f NavyDB/dbpasswd >chains.sh: #2132: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED >chains.sh: Creating Root CA Navy >certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171720 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #2133: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED >chains.sh: Exporting Root CA Navy.der >certutil -L -d NavyDB -r -n Navy -o Navy.der >chains.sh: #2134: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED >chains.sh: Creating DB CAArmyDB >certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd >chains.sh: #2135: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED >chains.sh: Creating Intermediate certifiate request CAArmyReq.der >certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2136: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED >chains.sh: Creating certficate CAArmyArmy.der signed by Army >certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 306171721 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >y >OID.1.1 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #2137: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED >chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database >certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der >chains.sh: #2138: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED >chains.sh: Creating DB CANavyDB >certutil -N -d CANavyDB -f CANavyDB/dbpasswd >chains.sh: #2139: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED >chains.sh: Creating Intermediate certifiate request CANavyReq.der >certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2140: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED >chains.sh: Creating certficate CANavyNavy.der signed by Navy >certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 306171722 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.2.0 >1 >n >y >OID.2.1 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #2141: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED >chains.sh: Importing certificate CANavyNavy.der to CANavyDB database >certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der >chains.sh: #2142: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED >chains.sh: Creating DB BridgeDB >certutil -N -d BridgeDB -f BridgeDB/dbpasswd >chains.sh: #2143: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED >chains.sh: Creating Bridge certifiate request BridgeReq.der >certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2144: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED >chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy >certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 306171723 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >y >OID.1.1 >1 >n >n >n >OID.1.1 >OID.2.1 >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] >Is this a critical extension [y/N]? >chains.sh: #2145: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED >chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database >certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der >chains.sh: #2146: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED >chains.sh: Creating certficate BridgeCANavy.der signed by CANavy >certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 306171724 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.2.0 >1 >n >y >OID.2.1 >1 >n >n >n >OID.2.1 >OID.1.1 >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] >Is this a critical extension [y/N]? >chains.sh: #2147: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED >chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database >certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der >chains.sh: #2148: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED >chains.sh: Generating PKCS7 package from BridgeDB database >cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 >chains.sh: #2149: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #2150: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2151: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Bridge.der signed by Bridge >certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 306171725 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.1 >1 >n >y >OID.2.1 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #2152: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED >chains.sh: Importing certificate CA1Bridge.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der >chains.sh: #2153: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #2154: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2155: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2Bridge.der signed by Bridge >certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 306171726 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.1.0 >1 >n >y >OID.2.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #2156: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED >chains.sh: Importing certificate CA2Bridge.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der >chains.sh: #2157: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED >chains.sh: Creating DB EE1DB >certutil -N -d EE1DB -f EE1DB/dbpasswd >chains.sh: #2158: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED >chains.sh: Creating EE certifiate request EE1Req.der >certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #2159: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED >chains.sh: Creating certficate EE1CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 306171727 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.2.1 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #2160: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate EE1CA1.der to EE1DB database >certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der >chains.sh: #2161: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED >chains.sh: Creating DB EE2DB >certutil -N -d EE2DB -f EE2DB/dbpasswd >chains.sh: #2162: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED >chains.sh: Creating EE certifiate request EE2Req.der >certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #2163: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED >chains.sh: Creating certficate EE2CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 306171728 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >OID.2.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #2164: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate EE2CA2.der to EE2DB database >certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der >chains.sh: #2165: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der >vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2166: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der >vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171719 (0x123fcf47) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Army ROOT CA,O=Army,C=US" > Validity: > Not Before: Thu Mar 07 00:16:40 2013 > Not After : Wed Mar 07 00:16:40 2063 > Subject: "CN=Army ROOT CA,O=Army,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c5:bf:82:cc:1a:3b:72:b3:54:26:ef:de:c1:f6:fb:d1: > de:f3:ab:3b:98:97:da:06:8d:91:f2:d0:bc:c1:43:62: > 7c:6c:01:0e:d2:f7:3d:14:5f:47:eb:69:ad:79:68:c0: > 98:58:7e:c2:e9:36:97:c5:1f:2e:63:c6:03:be:1f:55: > a9:06:d1:05:21:5d:70:19:f2:9e:05:c9:eb:2e:3f:46: > e7:56:82:78:7c:e6:bd:f0:cd:32:12:3c:60:e4:e5:59: > b9:f7:7e:ca:70:88:ed:15:69:88:4b:f4:4e:c2:84:6b: > 1f:0d:64:50:15:2f:76:c5:4d:45:43:3b:df:79:8c:eb > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 1d:ff:f9:c9:be:50:a5:93:b9:b8:2c:05:21:22:8c:20: > 4a:45:5d:a9:b6:b8:7e:d0:b6:72:13:4f:c6:d2:87:0b: > 0b:9e:d6:05:82:21:0c:cf:b4:a5:47:8f:1c:2d:0b:e7: > c3:ec:a8:83:c8:0f:0c:08:c5:da:bc:0a:ec:3c:99:00: > e2:56:7f:81:71:df:01:e4:26:ba:dd:e9:0a:30:7b:5d: > 28:74:3a:62:0a:ea:67:d3:88:86:04:ba:59:21:6d:cc: > 10:d4:c1:2b:4f:68:7f:b0:92:b9:76:93:a9:dd:38:48: > b9:ec:07:1b:bd:cf:52:74:a0:c8:d0:03:41:5d:fb:b9 > Fingerprint (MD5): > 99:37:49:DA:12:48:76:E2:31:56:24:5B:BE:43:20:84 > Fingerprint (SHA1): > C7:44:1D:73:4B:CA:15:35:38:40:02:0E:E1:52:7A:04:64:98:78:5E >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" >Returned value is 0, expected result is pass >chains.sh: #2167: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der >vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2168: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der >vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2169: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der >vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2170: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der >vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2171: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der >vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2172: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der >vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2173: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der >vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2174: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der >vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2175: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der >vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171720 (0x123fcf48) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:16:40 2013 > Not After : Wed Mar 07 00:16:40 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c9:93:4b:f7:6b:33:d7:49:f6:ee:bd:2a:d1:7a:28:e6: > 17:61:03:10:b7:4f:19:28:be:ed:38:47:16:f7:21:8d: > 54:7f:a3:64:e8:50:90:a6:0c:3b:60:d7:6a:86:63:90: > 85:31:f8:88:ac:cd:15:4c:11:cf:16:f3:d3:31:13:0f: > 69:be:b7:75:b6:72:09:59:f1:36:7d:94:e6:c2:08:a3: > d4:3b:36:c3:bf:c2:b8:64:f5:d1:52:c5:9d:f9:78:06: > ff:cc:16:d6:cf:6f:33:30:67:5c:c7:a6:83:d8:2d:7e: > 85:69:19:8e:e8:97:73:ab:9f:32:ba:81:b7:36:95:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 08:9f:27:ba:29:43:47:c6:f4:00:15:ad:ea:40:1d:42: > 9b:cf:76:ec:69:3c:ce:7a:8d:d4:14:c1:4d:39:32:eb: > 0c:39:2d:7c:ea:ad:8d:31:e9:18:ee:cc:ce:95:7e:bf: > a4:02:8a:5a:27:71:6b:87:0d:33:c2:96:8b:61:5b:34: > 08:08:be:91:9f:16:9c:64:6f:b5:66:7f:3a:4d:45:c1: > 72:88:1d:7e:76:3d:5f:df:c6:76:82:35:ea:59:c0:b8: > d5:2e:2b:96:53:23:d8:96:9a:26:c0:64:28:7c:03:b3: > 80:ca:15:ee:11:9c:ca:b3:cb:fb:b8:d0:c5:0b:86:79 > Fingerprint (MD5): > 64:3E:DB:2E:82:53:81:7E:A2:1C:04:55:CF:CA:4B:72 > Fingerprint (SHA1): > 03:5B:61:E8:AD:4E:93:87:1C:91:F8:7A:58:69:76:A5:F1:19:C3:A2 >Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" >Returned value is 0, expected result is pass >chains.sh: #2176: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der >vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2177: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der >vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2178: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der >vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2179: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der >vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2180: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der >vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #2181: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #2182: RealCerts: Creating DB AllDB - PASSED >chains.sh: Importing certificate TestCA.ca.cert to AllDB database >certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert >chains.sh: #2183: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED >chains.sh: Importing certificate TestUser50.cert to AllDB database >certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert >chains.sh: #2184: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED >chains.sh: Importing certificate TestUser51.cert to AllDB database >certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert >chains.sh: #2185: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED >chains.sh: Importing certificate PayPalRootCA.cert to AllDB database >certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert >chains.sh: #2186: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED >chains.sh: Importing certificate PayPalICA.cert to AllDB database >certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert >chains.sh: #2187: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED >chains.sh: Importing certificate PayPalEE.cert to AllDB database >certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert >chains.sh: #2188: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED >chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database >certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert >chains.sh: #2189: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED >chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB >vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Wed Mar 19 21:04:25 2008 > Not After : Tue Mar 19 21:04:25 2058 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: > fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: > 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: > c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: > a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: > a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: > 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: > aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: > 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: > 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: > 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: > 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: > 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: > 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: > f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 > Fingerprint (MD5): > 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 > Fingerprint (SHA1): > 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo > untain View,ST=California,C=US" >Returned value is 0, expected result is pass >chains.sh: #2190: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB - PASSED >chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB >vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Wed Mar 19 21:04:25 2008 > Not After : Tue Mar 19 21:04:25 2058 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: > fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: > 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: > c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: > a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: > a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: > 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: > aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: > 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: > 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: > 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: > 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: > 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: > 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: > f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 > Fingerprint (MD5): > 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 > Fingerprint (SHA1): > 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo > untain View,ST=California,C=US" >Returned value is 0, expected result is pass >chains.sh: #2191: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB - PASSED >chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 >vfychain -d AllDB -pp -vv -o OID.2.16.840.1.113733.1.7.23.6 /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig > n, Inc.",C=US" > Validity: > Not Before: Wed Nov 08 00:00:00 2006 > Not After : Sun Nov 07 23:59:59 2021 > Subject: "CN=VeriSign Class 3 Public Primary Certification Authority > - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve > riSign Trust Network,O="VeriSign, Inc.",C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc: > 7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64: > 85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42: > b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec: > ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3: > 62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b: > 9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f: > e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db: > 7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af: > 1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a: > b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7: > ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74: > 24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4: > 8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95: > ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f: > 73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: CRL Distribution Points > Distribution point: > URI: "http://crl.verisign.com/pca3.crl" > Name: Certificate Key Usage > Critical: True > Usages: Certificate Signing > CRL Signing > Name: OID.1.3.6.1.5.5.7.1.12 > Data: Sequence { > [1]: { > [0]: { > Sequence { > Sequence { > Sequence { > "image/gif" > Sequence { > Sequence { > Sequence { > SHA-1 > } > 8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf: > 80:6a:d4:48:18:2c:7b:19:2e > } > } > Sequence { > "http://logo.verisign.com/vslogo.gif" > } > } > } > } > } > } > } > Name: Certificate Policies > Data: > Policy Name: Certificate Policies AnyPolicy > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Policy Qualifier Data: "https://www.verisign.com/cps" > Name: Certificate Subject Key ID > Data: > 7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02: > af:33:31:33 > Name: Certificate Authority Key Identifier > Issuer: > Directory Name: "OU=Class 3 Public Primary Certification Auth > ority,O="VeriSign, Inc.",C=US" > Serial Number: > 70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a: > f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31: > 47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c: > d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0: > ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d: > 5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a: > 84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1: > d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6 > Fingerprint (MD5): > C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C > Fingerprint (SHA1): > 87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13 > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc > .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C= > US,serialNumber=3014267,businessCategory=Private Organization,incorporati > onState=Delaware,incorporationCountry=US" >Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter > ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network > ,O="VeriSign, Inc.",C=US" >Returned value is 0, expected result is pass >chains.sh: #2192: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 - PASSED >chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB >vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 0. BrAirWaysBadSig : > ERROR -8181: Peer's Certificate has expired. >Returned value is 1, expected result is fail >chains.sh: #2193: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB - PASSED >chains.sh: Creating DB RootDB >certutil -N -d RootDB -f RootDB/dbpasswd >chains.sh: #2194: DSA: Creating DB RootDB - PASSED >chains.sh: Creating Root CA Root >certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171729 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #2195: DSA: Creating Root CA Root - PASSED >chains.sh: Exporting Root CA Root.der >certutil -L -d RootDB -r -n Root -o Root.der >chains.sh: #2196: DSA: Exporting Root CA Root.der - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #2197: DSA: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2198: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 306171730 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2199: DSA: Creating certficate CA1Root.der signed by Root - PASSED >chains.sh: Importing certificate CA1Root.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der >chains.sh: #2200: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED >chains.sh: Creating DB EE1DB >certutil -N -d EE1DB -f EE1DB/dbpasswd >chains.sh: #2201: DSA: Creating DB EE1DB - PASSED >chains.sh: Creating EE certifiate request EE1Req.der >certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #2202: DSA: Creating EE certifiate request EE1Req.der - PASSED >chains.sh: Creating certficate EE1CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 306171731 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2203: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate EE1CA1.der to EE1DB database >certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der >chains.sh: #2204: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #2205: DSA: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2206: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 306171732 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2207: DSA: Creating certficate CA2Root.der signed by Root - PASSED >chains.sh: Importing certificate CA2Root.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der >chains.sh: #2208: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED >chains.sh: Creating DB EE2DB >certutil -N -d EE2DB -f EE2DB/dbpasswd >chains.sh: #2209: DSA: Creating DB EE2DB - PASSED >chains.sh: Creating EE certifiate request EE2Req.der >certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #2210: DSA: Creating EE certifiate request EE2Req.der - PASSED >chains.sh: Creating certficate EE2CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 306171733 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2211: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate EE2CA2.der to EE2DB database >certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der >chains.sh: #2212: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED >chains.sh: Creating DB CA3DB >certutil -N -d CA3DB -f CA3DB/dbpasswd >chains.sh: #2213: DSA: Creating DB CA3DB - PASSED >chains.sh: Creating Intermediate certifiate request CA3Req.der >certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2214: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED >chains.sh: Creating certficate CA3Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 306171734 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2215: DSA: Creating certficate CA3Root.der signed by Root - PASSED >chains.sh: Importing certificate CA3Root.der to CA3DB database >certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der >chains.sh: #2216: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED >chains.sh: Creating DB EE3DB >certutil -N -d EE3DB -f EE3DB/dbpasswd >chains.sh: #2217: DSA: Creating DB EE3DB - PASSED >chains.sh: Creating EE certifiate request EE3Req.der >certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #2218: DSA: Creating EE certifiate request EE3Req.der - PASSED >chains.sh: Creating certficate EE3CA3.der signed by CA3 >certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 306171735 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2219: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED >chains.sh: Importing certificate EE3CA3.der to EE3DB database >certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der >chains.sh: #2220: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED >chains.sh: Creating DB CA4DB >certutil -N -d CA4DB -f CA4DB/dbpasswd >chains.sh: #2221: DSA: Creating DB CA4DB - PASSED >chains.sh: Creating Intermediate certifiate request CA4Req.der >certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2222: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED >chains.sh: Creating certficate CA4Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 306171736 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2223: DSA: Creating certficate CA4Root.der signed by Root - PASSED >chains.sh: Importing certificate CA4Root.der to CA4DB database >certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der >chains.sh: #2224: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED >chains.sh: Creating DB EE4DB >certutil -N -d EE4DB -f EE4DB/dbpasswd >chains.sh: #2225: DSA: Creating DB EE4DB - PASSED >chains.sh: Creating EE certifiate request EE4Req.der >certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #2226: DSA: Creating EE certifiate request EE4Req.der - PASSED >chains.sh: Creating certficate EE4CA4.der signed by CA4 >certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 306171737 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2227: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED >chains.sh: Importing certificate EE4CA4.der to EE4DB database >certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der >chains.sh: #2228: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #2229: DSA: Creating DB AllDB - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der >vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171729 (0x123fcf51) > Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:44 2013 > Not After : Wed Mar 07 00:16:44 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: ANSI X9.57 DSA Signature > Args: > 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: > db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: > c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: > 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: > fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: > 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: > c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: > 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: > ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: > 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: > 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: > 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: > f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: > 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: > da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: > 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: > 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: > f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: > a5:10 > DSA Public Key: > Prime: > 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: > b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: > 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: > af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: > 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: > af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: > c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: > 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d > Subprime: > b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: > 76:27:03:81 > Base: > 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: > 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: > f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: > 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: > 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: > 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: > 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: > 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 > PublicValue: > 83:ed:f4:ec:71:9d:89:39:12:f1:4f:b5:d7:0a:4e:cd: > c7:2b:1a:db:30:0c:e8:aa:a8:57:66:43:38:b0:a9:63: > 14:22:73:ae:42:14:37:79:bc:2e:83:de:96:65:f0:7e: > 4a:fb:35:be:29:f4:38:2a:77:14:fa:49:fa:e1:6a:27: > 74:b0:a3:0e:7f:27:2b:79:09:e4:a9:98:86:43:4c:d6: > 2f:de:81:90:43:68:40:7e:48:ca:fd:58:10:fa:d4:56: > 8b:6e:80:23:9f:0d:df:23:ff:5e:05:d1:1e:03:9f:34: > ca:53:6f:2f:2a:c2:da:3f:21:02:00:88:e4:08:c1:f7 > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest > Signature: > 30:2c:02:14:33:68:bc:aa:f0:4a:c8:d6:4b:06:3d:39: > ea:b0:b0:28:f7:1a:61:ca:02:14:3d:3b:f4:0d:58:64: > f9:0e:8c:91:7d:01:aa:79:4d:83:9a:14:22:b2 > Fingerprint (MD5): > DF:AB:0D:62:49:BC:5A:AE:AC:2A:50:3F:4A:E1:EB:B0 > Fingerprint (SHA1): > 4D:3F:2B:AA:D6:89:DD:76:E9:64:16:0B:0A:57:27:DA:03:CE:0E:6E >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #2230: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der >vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171729 (0x123fcf51) > Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:44 2013 > Not After : Wed Mar 07 00:16:44 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: ANSI X9.57 DSA Signature > Args: > 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: > db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: > c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: > 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: > fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: > 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: > c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: > 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: > ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: > 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: > 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: > 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: > f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: > 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: > da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: > 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: > 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: > f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: > a5:10 > DSA Public Key: > Prime: > 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: > b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: > 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: > af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: > 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: > af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: > c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: > 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d > Subprime: > b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: > 76:27:03:81 > Base: > 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: > 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: > f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: > 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: > 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: > 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: > 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: > 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 > PublicValue: > 83:ed:f4:ec:71:9d:89:39:12:f1:4f:b5:d7:0a:4e:cd: > c7:2b:1a:db:30:0c:e8:aa:a8:57:66:43:38:b0:a9:63: > 14:22:73:ae:42:14:37:79:bc:2e:83:de:96:65:f0:7e: > 4a:fb:35:be:29:f4:38:2a:77:14:fa:49:fa:e1:6a:27: > 74:b0:a3:0e:7f:27:2b:79:09:e4:a9:98:86:43:4c:d6: > 2f:de:81:90:43:68:40:7e:48:ca:fd:58:10:fa:d4:56: > 8b:6e:80:23:9f:0d:df:23:ff:5e:05:d1:1e:03:9f:34: > ca:53:6f:2f:2a:c2:da:3f:21:02:00:88:e4:08:c1:f7 > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest > Signature: > 30:2c:02:14:33:68:bc:aa:f0:4a:c8:d6:4b:06:3d:39: > ea:b0:b0:28:f7:1a:61:ca:02:14:3d:3b:f4:0d:58:64: > f9:0e:8c:91:7d:01:aa:79:4d:83:9a:14:22:b2 > Fingerprint (MD5): > DF:AB:0D:62:49:BC:5A:AE:AC:2A:50:3F:4A:E1:EB:B0 > Fingerprint (SHA1): > 4D:3F:2B:AA:D6:89:DD:76:E9:64:16:0B:0A:57:27:DA:03:CE:0E:6E >Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Returned value is 0, expected result is pass >chains.sh: #2231: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der - PASSED >chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der >vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171729 (0x123fcf51) > Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:44 2013 > Not After : Wed Mar 07 00:16:44 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: ANSI X9.57 DSA Signature > Args: > 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: > db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: > c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: > 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: > fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: > 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: > c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: > 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: > ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: > 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: > 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: > 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: > f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: > 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: > da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: > 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: > 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: > f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: > a5:10 > DSA Public Key: > Prime: > 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: > b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: > 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: > af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: > 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: > af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: > c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: > 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d > Subprime: > b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: > 76:27:03:81 > Base: > 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: > 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: > f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: > 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: > 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: > 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: > 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: > 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 > PublicValue: > 83:ed:f4:ec:71:9d:89:39:12:f1:4f:b5:d7:0a:4e:cd: > c7:2b:1a:db:30:0c:e8:aa:a8:57:66:43:38:b0:a9:63: > 14:22:73:ae:42:14:37:79:bc:2e:83:de:96:65:f0:7e: > 4a:fb:35:be:29:f4:38:2a:77:14:fa:49:fa:e1:6a:27: > 74:b0:a3:0e:7f:27:2b:79:09:e4:a9:98:86:43:4c:d6: > 2f:de:81:90:43:68:40:7e:48:ca:fd:58:10:fa:d4:56: > 8b:6e:80:23:9f:0d:df:23:ff:5e:05:d1:1e:03:9f:34: > ca:53:6f:2f:2a:c2:da:3f:21:02:00:88:e4:08:c1:f7 > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest > Signature: > 30:2c:02:14:33:68:bc:aa:f0:4a:c8:d6:4b:06:3d:39: > ea:b0:b0:28:f7:1a:61:ca:02:14:3d:3b:f4:0d:58:64: > f9:0e:8c:91:7d:01:aa:79:4d:83:9a:14:22:b2 > Fingerprint (MD5): > DF:AB:0D:62:49:BC:5A:AE:AC:2A:50:3F:4A:E1:EB:B0 > Fingerprint (SHA1): > 4D:3F:2B:AA:D6:89:DD:76:E9:64:16:0B:0A:57:27:DA:03:CE:0E:6E >Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" >Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" >Returned value is 0, expected result is pass >chains.sh: #2232: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der - PASSED >chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der >vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171729 (0x123fcf51) > Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:44 2013 > Not After : Wed Mar 07 00:16:44 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: ANSI X9.57 DSA Signature > Args: > 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: > db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: > c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: > 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: > fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: > 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: > c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: > 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: > ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: > 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: > 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: > 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: > f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: > 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: > da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: > 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: > 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: > f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: > a5:10 > DSA Public Key: > Prime: > 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: > b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: > 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: > af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: > 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: > af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: > c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: > 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d > Subprime: > b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: > 76:27:03:81 > Base: > 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: > 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: > f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: > 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: > 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: > 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: > 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: > 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 > PublicValue: > 83:ed:f4:ec:71:9d:89:39:12:f1:4f:b5:d7:0a:4e:cd: > c7:2b:1a:db:30:0c:e8:aa:a8:57:66:43:38:b0:a9:63: > 14:22:73:ae:42:14:37:79:bc:2e:83:de:96:65:f0:7e: > 4a:fb:35:be:29:f4:38:2a:77:14:fa:49:fa:e1:6a:27: > 74:b0:a3:0e:7f:27:2b:79:09:e4:a9:98:86:43:4c:d6: > 2f:de:81:90:43:68:40:7e:48:ca:fd:58:10:fa:d4:56: > 8b:6e:80:23:9f:0d:df:23:ff:5e:05:d1:1e:03:9f:34: > ca:53:6f:2f:2a:c2:da:3f:21:02:00:88:e4:08:c1:f7 > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest > Signature: > 30:2c:02:14:33:68:bc:aa:f0:4a:c8:d6:4b:06:3d:39: > ea:b0:b0:28:f7:1a:61:ca:02:14:3d:3b:f4:0d:58:64: > f9:0e:8c:91:7d:01:aa:79:4d:83:9a:14:22:b2 > Fingerprint (MD5): > DF:AB:0D:62:49:BC:5A:AE:AC:2A:50:3F:4A:E1:EB:B0 > Fingerprint (SHA1): > 4D:3F:2B:AA:D6:89:DD:76:E9:64:16:0B:0A:57:27:DA:03:CE:0E:6E >Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" >Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" >Returned value is 0, expected result is pass >chains.sh: #2233: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der - PASSED >chains.sh: Creating DB RootDB >certutil -N -d RootDB -f RootDB/dbpasswd >chains.sh: #2234: Revocation: Creating DB RootDB - PASSED >chains.sh: Creating Root CA Root >certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #2235: Revocation: Creating Root CA Root - PASSED >chains.sh: Exporting Root CA Root.der >certutil -L -d RootDB -r -n Root -o Root.der >chains.sh: #2236: Revocation: Exporting Root CA Root.der - PASSED >chains.sh: Creating DB CA0DB >certutil -N -d CA0DB -f CA0DB/dbpasswd >chains.sh: #2237: Revocation: Creating DB CA0DB - PASSED >chains.sh: Creating Intermediate certifiate request CA0Req.der >certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2238: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED >chains.sh: Creating certficate CA0Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2239: Revocation: Creating certficate CA0Root.der signed by Root - PASSED >chains.sh: Importing certificate CA0Root.der to CA0DB database >certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der >chains.sh: #2240: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #2241: Revocation: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2242: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1CA0.der signed by CA0 >certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2243: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED >chains.sh: Importing certificate CA1CA0.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der >chains.sh: #2244: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED >chains.sh: Creating DB EE11DB >certutil -N -d EE11DB -f EE11DB/dbpasswd >chains.sh: #2245: Revocation: Creating DB EE11DB - PASSED >chains.sh: Creating EE certifiate request EE11Req.der >certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #2246: Revocation: Creating EE certifiate request EE11Req.der - PASSED >chains.sh: Creating certficate EE11CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2247: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate EE11CA1.der to EE11DB database >certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der >chains.sh: #2248: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED >chains.sh: Creating DB EE12DB >certutil -N -d EE12DB -f EE12DB/dbpasswd >chains.sh: #2249: Revocation: Creating DB EE12DB - PASSED >chains.sh: Creating EE certifiate request EE12Req.der >certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #2250: Revocation: Creating EE certifiate request EE12Req.der - PASSED >chains.sh: Creating certficate EE12CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2251: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate EE12CA1.der to EE12DB database >certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der >chains.sh: #2252: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #2253: Revocation: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2254: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2CA0.der signed by CA0 >certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2255: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED >chains.sh: Importing certificate CA2CA0.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der >chains.sh: #2256: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED >chains.sh: Creating DB EE21DB >certutil -N -d EE21DB -f EE21DB/dbpasswd >chains.sh: #2257: Revocation: Creating DB EE21DB - PASSED >chains.sh: Creating EE certifiate request EE21Req.der >certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #2258: Revocation: Creating EE certifiate request EE21Req.der - PASSED >chains.sh: Creating certficate EE21CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2259: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate EE21CA2.der to EE21DB database >certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der >chains.sh: #2260: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED >chains.sh: Create CRL for RootDB >crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl >=== Crlutil input data === >update=20130307001648Z >nextupdate=20140307001648Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > This Update: Thu Mar 07 00:16:48 2013 > Next Update: Fri Mar 07 00:16:48 2014 > CRL Extensions: >chains.sh: #2261: Revocation: Create CRL for RootDB - PASSED >chains.sh: Create CRL for CA0DB >crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl >=== Crlutil input data === >update=20130307001648Z >nextupdate=20140307001648Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA0 Intermediate,O=CA0,C=US" > This Update: Thu Mar 07 00:16:48 2013 > Next Update: Fri Mar 07 00:16:48 2014 > CRL Extensions: >chains.sh: #2262: Revocation: Create CRL for CA0DB - PASSED >chains.sh: Create CRL for CA1DB >crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl >=== Crlutil input data === >update=20130307001648Z >nextupdate=20140307001648Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > This Update: Thu Mar 07 00:16:48 2013 > Next Update: Fri Mar 07 00:16:48 2014 > CRL Extensions: >chains.sh: #2263: Revocation: Create CRL for CA1DB - PASSED >chains.sh: Create CRL for CA2DB >crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl >=== Crlutil input data === >update=20130307001648Z >nextupdate=20140307001648Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA2 Intermediate,O=CA2,C=US" > This Update: Thu Mar 07 00:16:48 2013 > Next Update: Fri Mar 07 00:16:48 2014 > CRL Extensions: >chains.sh: #2264: Revocation: Create CRL for CA2DB - PASSED >chains.sh: Revoking certificate with SN 14 issued by CA1 >crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl >=== Crlutil input data === >update=20130307001649Z >addcert 14 20130307001649Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > This Update: Thu Mar 07 00:16:49 2013 > Next Update: Fri Mar 07 00:16:48 2014 > Entry 1 (0x1): > Serial Number: 14 (0xe) > Revocation Date: Thu Mar 07 00:16:49 2013 > CRL Extensions: >chains.sh: #2265: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED >chains.sh: Revoking certificate with SN 15 issued by CA0 >crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl >=== Crlutil input data === >update=20130307001650Z >addcert 15 20130307001650Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA0 Intermediate,O=CA0,C=US" > This Update: Thu Mar 07 00:16:50 2013 > Next Update: Fri Mar 07 00:16:48 2014 > Entry 1 (0x1): > Serial Number: 15 (0xf) > Revocation Date: Thu Mar 07 00:16:50 2013 > CRL Extensions: >chains.sh: #2266: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #2267: Revocation: Creating DB AllDB - PASSED >chains.sh: Importing certificate Root.der to AllDB database >certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der >chains.sh: #2268: Revocation: Importing certificate Root.der to AllDB database - PASSED >chains.sh: Importing CRL Root.crl to AllDB database >crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl >chains.sh: #2269: Revocation: Importing CRL Root.crl to AllDB database - PASSED >chains.sh: Importing certificate CA0Root.der to AllDB database >certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der >chains.sh: #2270: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED >chains.sh: Importing CRL CA0.crl to AllDB database >crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl >chains.sh: #2271: Revocation: Importing CRL CA0.crl to AllDB database - PASSED >chains.sh: Importing certificate CA1CA0.der to AllDB database >certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der >chains.sh: #2272: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED >chains.sh: Importing CRL CA1.crl to AllDB database >crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl >chains.sh: #2273: Revocation: Importing CRL CA1.crl to AllDB database - PASSED >chains.sh: Importing certificate CA2CA0.der to AllDB database >certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der >chains.sh: #2274: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED >chains.sh: Importing CRL CA2.crl to AllDB database >crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl >chains.sh: #2275: Revocation: Importing CRL CA2.crl to AllDB database - PASSED >chains.sh: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der >vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 10 (0xa) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:46 2013 > Not After : Wed Mar 07 00:16:46 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b9:3c:e2:cf:21:56:ad:35:6f:f9:08:97:2a:8b:44:68: > f8:ad:dc:65:a5:13:72:ca:08:59:94:fb:98:c1:06:c5: > 62:08:a4:9e:b2:37:66:f1:7e:6c:96:2f:38:68:b1:02: > 26:2f:e0:65:20:38:fd:e4:28:3d:b9:ce:3d:57:32:d6: > d9:8d:31:01:22:b6:3f:e6:77:c8:09:5b:e3:ba:a0:f5: > 5f:48:ff:e3:27:c0:cc:85:07:ef:08:9f:5f:d4:8f:ab: > 30:17:6a:6a:8b:a4:6c:15:27:6b:88:37:72:2f:2d:bb: > 0f:1e:97:91:68:4e:0a:e4:da:14:0e:7d:0f:b7:02:ab > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 7b:25:a2:03:7b:1d:e7:89:f8:a8:30:f1:43:6a:69:6a: > 88:0f:e2:3b:24:5c:49:71:f6:65:ec:6c:d2:de:b9:36: > 06:19:1e:8a:ce:3a:82:5c:e2:45:fd:6a:fe:ae:97:94: > 70:c3:54:d8:f5:9a:ba:0f:18:b8:07:56:74:17:75:c3: > 32:6b:26:67:98:e2:15:80:46:50:e1:7f:3a:d3:9f:08: > 20:fe:96:65:d6:6b:e9:cb:e4:f8:3a:7b:51:ae:a9:58: > c9:bf:3e:c1:77:d3:a4:05:40:32:d6:b4:3d:d4:31:f8: > 80:a8:49:97:7f:99:2d:00:bc:02:f5:6f:e4:a9:d6:3a > Fingerprint (MD5): > 3B:65:C8:33:DD:91:32:5B:91:8B:82:C4:41:92:7C:AC > Fingerprint (SHA1): > 59:82:03:0E:A2:7A:3B:1F:FE:13:4C:8C:EA:8F:02:AF:41:24:1A:ED > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" >Returned value is 0, expected result is pass >chains.sh: #2276: Revocation: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED >chains.sh: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der >vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. Root [Certificate Authority]: > ERROR -8180: Peer's Certificate has been revoked. >Returned value is 1, expected result is fail >chains.sh: #2277: Revocation: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED >chains.sh: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der >vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 10 (0xa) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:46 2013 > Not After : Wed Mar 07 00:16:46 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b9:3c:e2:cf:21:56:ad:35:6f:f9:08:97:2a:8b:44:68: > f8:ad:dc:65:a5:13:72:ca:08:59:94:fb:98:c1:06:c5: > 62:08:a4:9e:b2:37:66:f1:7e:6c:96:2f:38:68:b1:02: > 26:2f:e0:65:20:38:fd:e4:28:3d:b9:ce:3d:57:32:d6: > d9:8d:31:01:22:b6:3f:e6:77:c8:09:5b:e3:ba:a0:f5: > 5f:48:ff:e3:27:c0:cc:85:07:ef:08:9f:5f:d4:8f:ab: > 30:17:6a:6a:8b:a4:6c:15:27:6b:88:37:72:2f:2d:bb: > 0f:1e:97:91:68:4e:0a:e4:da:14:0e:7d:0f:b7:02:ab > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 7b:25:a2:03:7b:1d:e7:89:f8:a8:30:f1:43:6a:69:6a: > 88:0f:e2:3b:24:5c:49:71:f6:65:ec:6c:d2:de:b9:36: > 06:19:1e:8a:ce:3a:82:5c:e2:45:fd:6a:fe:ae:97:94: > 70:c3:54:d8:f5:9a:ba:0f:18:b8:07:56:74:17:75:c3: > 32:6b:26:67:98:e2:15:80:46:50:e1:7f:3a:d3:9f:08: > 20:fe:96:65:d6:6b:e9:cb:e4:f8:3a:7b:51:ae:a9:58: > c9:bf:3e:c1:77:d3:a4:05:40:32:d6:b4:3d:d4:31:f8: > 80:a8:49:97:7f:99:2d:00:bc:02:f5:6f:e4:a9:d6:3a > Fingerprint (MD5): > 3B:65:C8:33:DD:91:32:5B:91:8B:82:C4:41:92:7C:AC > Fingerprint (SHA1): > 59:82:03:0E:A2:7A:3B:1F:FE:13:4C:8C:EA:8F:02:AF:41:24:1A:ED > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" >Returned value is 0, expected result is pass >chains.sh: #2278: Revocation: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED >chains.sh: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der >vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. Root [Certificate Authority]: > ERROR -8180: Peer's Certificate has been revoked. >Returned value is 1, expected result is fail >chains.sh: #2279: Revocation: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED >chains.sh: Creating DB RootDB >certutil -N -d RootDB -f RootDB/dbpasswd >chains.sh: #2280: CRLDP: Creating DB RootDB - PASSED >chains.sh: Creating Root CA Root >certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171738 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #2281: CRLDP: Creating Root CA Root - PASSED >chains.sh: Exporting Root CA Root.der >certutil -L -d RootDB -r -n Root -o Root.der >chains.sh: #2282: CRLDP: Exporting Root CA Root.der - PASSED >chains.sh: Creating DB CA0DB >certutil -N -d CA0DB -f CA0DB/dbpasswd >chains.sh: #2283: CRLDP: Creating DB CA0DB - PASSED >chains.sh: Creating Intermediate certifiate request CA0Req.der >certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2284: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED >chains.sh: Creating certficate CA0Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 306171739 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2285: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED >chains.sh: Importing certificate CA0Root.der to CA0DB database >certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der >chains.sh: #2286: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #2287: CRLDP: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA0-306171627.crl >-1 >-1 >-1 >n >n >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >Enter the type of the distribution point name: > 1 - Full Name > 2 - Relative Name > Any other number to finish > Choice: > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Select one of the following for the reason flags > 0 - unused > 1 - keyCompromise > 2 - caCompromise > 3 - affiliationChanged > 4 - superseded > 5 - cessationOfOperation > 6 - certificateHold > Any other number to finish Choice: > Enter value for the CRL Issuer name: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? >Is this a critical extension [y/N]? >chains.sh: #2288: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1CA0.der signed by CA0 >certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA0Root-306171615.der >0 >n >n >=== >Enter access method type for Authority Information Access extension: > 1 - CA Issuers > 2 - OCSP > Anyother number to finish > Choice > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Add another location to the Authority Information Access extension [y/N] >Is this a critical extension [y/N]? >chains.sh: #2289: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED >chains.sh: Importing certificate CA1CA0.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der >chains.sh: #2290: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED >chains.sh: Creating DB EE11DB >certutil -N -d EE11DB -f EE11DB/dbpasswd >chains.sh: #2291: CRLDP: Creating DB EE11DB - PASSED >chains.sh: Creating EE certifiate request EE11Req.der >certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA0-306171627.crl >-1 >-1 >-1 >n >n >=== >Generating key. This may take a few moments... >Enter the type of the distribution point name: > 1 - Full Name > 2 - Relative Name > Any other number to finish > Choice: > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Select one of the following for the reason flags > 0 - unused > 1 - keyCompromise > 2 - caCompromise > 3 - affiliationChanged > 4 - superseded > 5 - cessationOfOperation > 6 - certificateHold > Any other number to finish Choice: > Enter value for the CRL Issuer name: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? >Is this a critical extension [y/N]? >chains.sh: #2292: CRLDP: Creating EE certifiate request EE11Req.der - PASSED >chains.sh: Creating certficate EE11CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 306171740 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2293: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate EE11CA1.der to EE11DB database >certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der >chains.sh: #2294: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #2295: CRLDP: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA0-306171627.crl >-1 >-1 >-1 >n >n >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >Enter the type of the distribution point name: > 1 - Full Name > 2 - Relative Name > Any other number to finish > Choice: > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Select one of the following for the reason flags > 0 - unused > 1 - keyCompromise > 2 - caCompromise > 3 - affiliationChanged > 4 - superseded > 5 - cessationOfOperation > 6 - certificateHold > Any other number to finish Choice: > Enter value for the CRL Issuer name: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? >Is this a critical extension [y/N]? >chains.sh: #2296: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2CA0.der signed by CA0 >certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA0Root-306171616.der >0 >n >n >=== >Enter access method type for Authority Information Access extension: > 1 - CA Issuers > 2 - OCSP > Anyother number to finish > Choice > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Add another location to the Authority Information Access extension [y/N] >Is this a critical extension [y/N]? >chains.sh: #2297: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED >chains.sh: Importing certificate CA2CA0.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der >chains.sh: #2298: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED >chains.sh: Creating DB EE21DB >certutil -N -d EE21DB -f EE21DB/dbpasswd >chains.sh: #2299: CRLDP: Creating DB EE21DB - PASSED >chains.sh: Creating EE certifiate request EE21Req.der >certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #2300: CRLDP: Creating EE certifiate request EE21Req.der - PASSED >chains.sh: Creating certficate EE21CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 306171741 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2301: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate EE21CA2.der to EE21DB database >certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der >chains.sh: #2302: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED >chains.sh: Creating DB EE1DB >certutil -N -d EE1DB -f EE1DB/dbpasswd >chains.sh: #2303: CRLDP: Creating DB EE1DB - PASSED >chains.sh: Creating EE certifiate request EE1Req.der >certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA0-306171627.crl >-1 >-1 >-1 >n >n >=== >Generating key. This may take a few moments... >Enter the type of the distribution point name: > 1 - Full Name > 2 - Relative Name > Any other number to finish > Choice: > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Select one of the following for the reason flags > 0 - unused > 1 - keyCompromise > 2 - caCompromise > 3 - affiliationChanged > 4 - superseded > 5 - cessationOfOperation > 6 - certificateHold > Any other number to finish Choice: > Enter value for the CRL Issuer name: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? >Is this a critical extension [y/N]? >chains.sh: #2304: CRLDP: Creating EE certifiate request EE1Req.der - PASSED >chains.sh: Creating certficate EE1CA0.der signed by CA0 >certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA0Root-306171617.der >0 >n >n >=== >Enter access method type for Authority Information Access extension: > 1 - CA Issuers > 2 - OCSP > Anyother number to finish > Choice > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Add another location to the Authority Information Access extension [y/N] >Is this a critical extension [y/N]? >chains.sh: #2305: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED >chains.sh: Importing certificate EE1CA0.der to EE1DB database >certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der >chains.sh: #2306: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED >chains.sh: Creating DB EE2DB >certutil -N -d EE2DB -f EE2DB/dbpasswd >chains.sh: #2307: CRLDP: Creating DB EE2DB - PASSED >chains.sh: Creating EE certifiate request EE2Req.der >certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA0-306171627.crl >-1 >-1 >-1 >n >n >=== >Generating key. This may take a few moments... >Enter the type of the distribution point name: > 1 - Full Name > 2 - Relative Name > Any other number to finish > Choice: > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Select one of the following for the reason flags > 0 - unused > 1 - keyCompromise > 2 - caCompromise > 3 - affiliationChanged > 4 - superseded > 5 - cessationOfOperation > 6 - certificateHold > Any other number to finish Choice: > Enter value for the CRL Issuer name: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? >Is this a critical extension [y/N]? >chains.sh: #2308: CRLDP: Creating EE certifiate request EE2Req.der - PASSED >chains.sh: Creating certficate EE2CA0.der signed by CA0 >certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA0Root-306171618.der >0 >n >n >=== >Enter access method type for Authority Information Access extension: > 1 - CA Issuers > 2 - OCSP > Anyother number to finish > Choice > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Add another location to the Authority Information Access extension [y/N] >Is this a critical extension [y/N]? >chains.sh: #2309: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED >chains.sh: Importing certificate EE2CA0.der to EE2DB database >certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der >chains.sh: #2310: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED >chains.sh: Create CRL for RootDB >crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl >=== Crlutil input data === >update=20130307001653Z >nextupdate=20140307001653Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > This Update: Thu Mar 07 00:16:53 2013 > Next Update: Fri Mar 07 00:16:53 2014 > CRL Extensions: >chains.sh: #2311: CRLDP: Create CRL for RootDB - PASSED >chains.sh: Create CRL for CA0DB >crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl >=== Crlutil input data === >update=20130307001653Z >nextupdate=20140307001653Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA0 Intermediate,O=CA0,C=US" > This Update: Thu Mar 07 00:16:53 2013 > Next Update: Fri Mar 07 00:16:53 2014 > CRL Extensions: >chains.sh: #2312: CRLDP: Create CRL for CA0DB - PASSED >chains.sh: Create CRL for CA1DB >crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl >=== Crlutil input data === >update=20130307001653Z >nextupdate=20140307001653Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > This Update: Thu Mar 07 00:16:53 2013 > Next Update: Fri Mar 07 00:16:53 2014 > CRL Extensions: >chains.sh: #2313: CRLDP: Create CRL for CA1DB - PASSED >chains.sh: Create CRL for CA2DB >crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl >=== Crlutil input data === >update=20130307001653Z >nextupdate=20140307001653Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA2 Intermediate,O=CA2,C=US" > This Update: Thu Mar 07 00:16:53 2013 > Next Update: Fri Mar 07 00:16:53 2014 > CRL Extensions: >chains.sh: #2314: CRLDP: Create CRL for CA2DB - PASSED >chains.sh: Revoking certificate with SN 20 issued by CA0 >crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl >=== Crlutil input data === >update=20130307001654Z >addcert 20 20130307001654Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA0 Intermediate,O=CA0,C=US" > This Update: Thu Mar 07 00:16:54 2013 > Next Update: Fri Mar 07 00:16:53 2014 > Entry 1 (0x1): > Serial Number: 20 (0x14) > Revocation Date: Thu Mar 07 00:16:54 2013 > CRL Extensions: >chains.sh: #2315: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED >chains.sh: Revoking certificate with SN 40 issued by CA0 >crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl >=== Crlutil input data === >update=20130307001655Z >addcert 40 20130307001655Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA0 Intermediate,O=CA0,C=US" > This Update: Thu Mar 07 00:16:55 2013 > Next Update: Fri Mar 07 00:16:53 2014 > Entry 1 (0x1): > Serial Number: 20 (0x14) > Revocation Date: Thu Mar 07 00:16:54 2013 > Entry 2 (0x2): > Serial Number: 40 (0x28) > Revocation Date: Thu Mar 07 00:16:55 2013 > CRL Extensions: >chains.sh: #2316: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #2317: CRLDP: Creating DB AllDB - PASSED >chains.sh: Importing certificate Root.der to AllDB database >certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der >chains.sh: #2318: CRLDP: Importing certificate Root.der to AllDB database - PASSED >chains.sh: Importing CRL Root.crl to AllDB database >crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl >chains.sh: #2319: CRLDP: Importing CRL Root.crl to AllDB database - PASSED >chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -g chain -h requireFreshInfo -m crl -d AllDB -f -t Root.der >vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171738 (0x123fcf5a) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:51 2013 > Not After : Wed Mar 07 00:16:51 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > 9a:bf:0b:a4:e1:20:6e:94:dd:c8:c9:13:9e:e4:36:5b: > 1b:c1:73:f1:a5:fd:01:d5:d9:35:30:a5:19:b2:ce:b9: > 75:0b:33:40:ba:90:07:49:1a:c9:cf:e8:4c:59:a4:ca: > 19:23:e2:ef:b1:dc:56:02:42:07:f6:55:89:d4:d4:c5: > aa:b9:b8:0c:25:06:c9:97:b3:ce:16:8f:a5:02:27:66: > 5e:43:0c:e6:08:f0:84:27:bb:b4:2c:9f:53:66:62:34: > 6d:28:e1:87:3e:ef:99:e1:da:5b:3b:43:a9:66:a6:30: > fa:b8:3e:08:62:db:5e:d3:d5:4f:ab:b1:e7:c1:58:47 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 1e:db:16:3d:00:4a:fd:c2:6d:a8:70:81:12:e7:b6:b2: > e2:f1:95:8f:18:28:0c:0b:12:be:09:0f:99:b1:05:a8: > a9:7b:8e:68:d8:a2:38:cf:28:6c:93:8a:02:07:3d:e4: > 63:dc:e9:58:84:c7:f0:8b:2a:6e:c1:29:72:f1:3e:77: > af:78:87:1f:fe:d1:b5:2d:cd:d4:6a:39:67:90:d5:b3: > 4e:1b:43:68:94:d3:34:38:36:73:d0:da:4a:0b:c4:c7: > 85:a2:65:6f:6e:1f:5b:c7:fd:f1:03:cd:96:45:45:b2: > 7d:90:23:ed:bf:a5:b7:29:94:0c:4d:bb:97:bc:d0:de > Fingerprint (MD5): > 41:71:EF:8E:7D:E7:AB:3C:94:CF:8D:6D:8A:61:60:53 > Fingerprint (SHA1): > 84:CD:7F:4C:E9:86:76:97:1E:48:27:E6:50:A7:FE:65:D4:88:EB:26 > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" >Returned value is 0, expected result is pass >chains.sh: #2320: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -g chain -h requireFreshInfo -m crl -d AllDB -f -t Root.der - PASSED >chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -g chain -h requireFreshInfo -m crl -d AllDB -f -t Root.der >vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. Root [Certificate Authority]: > ERROR -8180: Peer's Certificate has been revoked. > ERROR -8180: Peer's Certificate has been revoked. >Returned value is 1, expected result is fail >chains.sh: #2321: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -g chain -h requireFreshInfo -m crl -d AllDB -f -t Root.der - PASSED >chains.sh: Verifying certificate(s) EE1CA0.der with flags -g leaf -h requireFreshInfo -m crl -d AllDB -f -t Root.der >vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171738 (0x123fcf5a) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:16:51 2013 > Not After : Wed Mar 07 00:16:51 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > 9a:bf:0b:a4:e1:20:6e:94:dd:c8:c9:13:9e:e4:36:5b: > 1b:c1:73:f1:a5:fd:01:d5:d9:35:30:a5:19:b2:ce:b9: > 75:0b:33:40:ba:90:07:49:1a:c9:cf:e8:4c:59:a4:ca: > 19:23:e2:ef:b1:dc:56:02:42:07:f6:55:89:d4:d4:c5: > aa:b9:b8:0c:25:06:c9:97:b3:ce:16:8f:a5:02:27:66: > 5e:43:0c:e6:08:f0:84:27:bb:b4:2c:9f:53:66:62:34: > 6d:28:e1:87:3e:ef:99:e1:da:5b:3b:43:a9:66:a6:30: > fa:b8:3e:08:62:db:5e:d3:d5:4f:ab:b1:e7:c1:58:47 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 1e:db:16:3d:00:4a:fd:c2:6d:a8:70:81:12:e7:b6:b2: > e2:f1:95:8f:18:28:0c:0b:12:be:09:0f:99:b1:05:a8: > a9:7b:8e:68:d8:a2:38:cf:28:6c:93:8a:02:07:3d:e4: > 63:dc:e9:58:84:c7:f0:8b:2a:6e:c1:29:72:f1:3e:77: > af:78:87:1f:fe:d1:b5:2d:cd:d4:6a:39:67:90:d5:b3: > 4e:1b:43:68:94:d3:34:38:36:73:d0:da:4a:0b:c4:c7: > 85:a2:65:6f:6e:1f:5b:c7:fd:f1:03:cd:96:45:45:b2: > 7d:90:23:ed:bf:a5:b7:29:94:0c:4d:bb:97:bc:d0:de > Fingerprint (MD5): > 41:71:EF:8E:7D:E7:AB:3C:94:CF:8D:6D:8A:61:60:53 > Fingerprint (SHA1): > 84:CD:7F:4C:E9:86:76:97:1E:48:27:E6:50:A7:FE:65:D4:88:EB:26 > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" >Returned value is 0, expected result is pass >chains.sh: #2322: CRLDP: Verifying certificate(s) EE1CA0.der with flags -g leaf -h requireFreshInfo -m crl -d AllDB -f -t Root.der - PASSED >chains.sh: Verifying certificate(s) EE2CA0.der with flags -g leaf -h requireFreshInfo -m crl -d AllDB -f -t Root.der >vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. Root [Certificate Authority]: > ERROR -8180: Peer's Certificate has been revoked. > ERROR -8180: Peer's Certificate has been revoked. >Returned value is 1, expected result is fail >chains.sh: #2323: CRLDP: Verifying certificate(s) EE2CA0.der with flags -g leaf -h requireFreshInfo -m crl -d AllDB -f -t Root.der - PASSED >chains.sh: Creating DB RootCADB >certutil -N -d RootCADB -f RootCADB/dbpasswd >chains.sh: #2324: TrustAnchors: Creating DB RootCADB - PASSED >chains.sh: Creating Root CA RootCA >certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171742 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #2325: TrustAnchors: Creating Root CA RootCA - PASSED >chains.sh: Exporting Root CA RootCA.der >certutil -L -d RootCADB -r -n RootCA -o RootCA.der >chains.sh: #2326: TrustAnchors: Exporting Root CA RootCA.der - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #2327: TrustAnchors: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2328: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1RootCA.der signed by RootCA >certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 306171743 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2329: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED >chains.sh: Importing certificate CA1RootCA.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der >chains.sh: #2330: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #2331: TrustAnchors: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2332: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 306171744 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2333: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA2CA1.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der >chains.sh: #2334: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED >chains.sh: Creating DB EE1DB >certutil -N -d EE1DB -f EE1DB/dbpasswd >chains.sh: #2335: TrustAnchors: Creating DB EE1DB - PASSED >chains.sh: Creating EE certifiate request EE1Req.der >certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #2336: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED >chains.sh: Creating certficate EE1CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 306171745 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2337: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate EE1CA2.der to EE1DB database >certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der >chains.sh: #2338: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED >chains.sh: Creating DB OtherRootDB >certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd >chains.sh: #2339: TrustAnchors: Creating DB OtherRootDB - PASSED >chains.sh: Creating Root CA OtherRoot >certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -m 306171746 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #2340: TrustAnchors: Creating Root CA OtherRoot - PASSED >chains.sh: Exporting Root CA OtherRoot.der >certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der >chains.sh: #2341: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED >chains.sh: Creating DB OtherIntermediateDB >certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd >chains.sh: #2342: TrustAnchors: Creating DB OtherIntermediateDB - PASSED >chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der >certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #2343: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED >chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot >certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 306171747 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2344: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED >chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database >certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der >chains.sh: #2345: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED >chains.sh: Creating DB EE2DB >certutil -N -d EE2DB -f EE2DB/dbpasswd >chains.sh: #2346: TrustAnchors: Creating DB EE2DB - PASSED >chains.sh: Creating EE certifiate request EE2Req.der >certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #2347: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED >chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate >certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 306171748 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cu_data >=== Certutil input data === >=== >chains.sh: #2348: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED >chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database >certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der >chains.sh: #2349: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED >chains.sh: Creating DB DBOnlyDB >certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd >chains.sh: #2350: TrustAnchors: Creating DB DBOnlyDB - PASSED >chains.sh: Importing certificate RootCA.der to DBOnlyDB database >certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der >chains.sh: #2351: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED >chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database >certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der >chains.sh: #2352: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED >chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB >vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171742 (0x123fcf5e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:16:56 2013 > Not After : Wed Mar 07 00:16:56 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > f1:54:2c:9f:4c:73:1d:c3:9c:65:6f:fd:6f:59:b7:d9: > 02:4d:2c:be:6f:ac:f3:49:40:fb:5e:15:2b:27:8e:23: > 22:19:e2:a3:84:28:78:56:dc:84:e1:d2:24:c8:2f:30: > 4b:45:35:c3:7f:03:ec:98:04:06:39:82:67:d2:b3:d4: > d5:83:d9:f3:20:c7:ec:04:c9:24:b4:d6:11:be:3b:00: > 0c:58:39:f4:98:98:c8:36:d3:db:39:07:34:20:39:c6: > 5e:78:0d:fe:85:92:3a:61:87:fa:9e:ed:93:38:79:30: > db:c4:6f:f3:f9:aa:72:bd:dc:72:1c:a6:b0:e9:65:d3 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > ba:59:a4:e9:b7:63:ce:52:3e:3f:c5:f6:47:c4:c9:98: > 22:90:99:b0:ef:d5:da:8a:00:fb:1e:fd:20:92:92:0d: > 01:06:e5:cc:1f:c1:bd:2d:a1:ab:4f:32:24:24:8f:f1: > ba:1e:12:7a:fb:ea:27:af:85:04:0e:19:e0:00:ff:a3: > b1:c2:60:7d:f8:76:de:1d:a8:43:af:7e:af:78:ea:4a: > 37:21:b0:3d:df:21:98:64:53:8b:e4:8a:31:94:f4:b4: > 55:de:fd:ad:64:68:d3:a9:6d:c7:d9:ba:42:66:c0:a9: > ea:9e:8a:92:8c:8e:3a:e9:79:ad:e2:c4:e0:8b:d7:02 > Fingerprint (MD5): > 6B:C7:5E:6E:E9:5D:7F:DE:84:B7:E1:FD:F5:8F:82:A4 > Fingerprint (SHA1): > B8:C9:71:A6:38:AA:1E:DA:C4:0F:4D:33:B0:7B:A3:79:C1:FD:09:20 > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #2353: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB - PASSED >chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -t CA2CA1.der >vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171744 (0x123fcf60) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:16:56 2013 > Not After : Wed Mar 07 00:16:56 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c2:a7:63:37:d6:19:b9:fe:f3:a5:87:71:5c:0d:a1:bb: > c0:54:dc:75:e6:d0:7b:14:9f:1b:45:15:bc:6f:49:d4: > b8:d2:ff:6b:8b:c2:95:3f:e3:d5:46:5f:71:9e:3a:ec: > 89:71:4e:48:f6:0e:c5:ff:87:27:26:a3:48:23:53:13: > dc:2a:42:e0:03:4c:bd:04:87:09:4d:97:f7:5c:a2:45: > 05:9b:e0:95:8c:fb:f0:cd:6c:50:dc:65:6f:90:ee:71: > b4:c7:84:f6:7d:16:e4:67:6a:ad:1e:9f:c3:6e:f8:2f: > 03:56:71:7f:1a:db:21:70:5a:79:50:e6:1d:df:52:77 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 0e:5d:6d:f7:8a:65:c5:90:d0:39:be:8f:34:47:c4:38: > e5:a9:27:76:ee:57:35:1a:5d:0a:11:4c:fc:c2:d2:98: > 06:83:10:bd:43:dd:2e:11:6f:56:df:2f:08:d5:05:a1: > e2:19:a1:2a:60:11:67:9b:96:43:b9:3d:37:3b:0c:e9: > 98:47:7c:09:0e:a1:e0:72:0d:d8:e5:ac:8f:88:f2:2f: > 3a:2a:50:cc:36:a2:e1:75:7d:5d:df:3c:b9:3b:fd:4f: > b0:f6:31:d7:65:f5:30:62:32:28:f1:15:42:1c:79:f1: > e7:9d:9c:8a:c5:10:ee:1d:80:4e:cf:7f:ca:90:da:37 > Fingerprint (MD5): > AE:13:7A:E4:11:7D:A9:6D:BD:CF:58:01:C7:E1:D8:E5 > Fingerprint (SHA1): > 6C:EC:AF:41:41:AF:4A:29:23:6E:D8:1E:CD:DD:78:E9:9C:2A:E6:41 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Returned value is 0, expected result is pass >chains.sh: #2354: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -t CA2CA1.der - PASSED >chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -t RootCA >vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171742 (0x123fcf5e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:16:56 2013 > Not After : Wed Mar 07 00:16:56 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > f1:54:2c:9f:4c:73:1d:c3:9c:65:6f:fd:6f:59:b7:d9: > 02:4d:2c:be:6f:ac:f3:49:40:fb:5e:15:2b:27:8e:23: > 22:19:e2:a3:84:28:78:56:dc:84:e1:d2:24:c8:2f:30: > 4b:45:35:c3:7f:03:ec:98:04:06:39:82:67:d2:b3:d4: > d5:83:d9:f3:20:c7:ec:04:c9:24:b4:d6:11:be:3b:00: > 0c:58:39:f4:98:98:c8:36:d3:db:39:07:34:20:39:c6: > 5e:78:0d:fe:85:92:3a:61:87:fa:9e:ed:93:38:79:30: > db:c4:6f:f3:f9:aa:72:bd:dc:72:1c:a6:b0:e9:65:d3 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > ba:59:a4:e9:b7:63:ce:52:3e:3f:c5:f6:47:c4:c9:98: > 22:90:99:b0:ef:d5:da:8a:00:fb:1e:fd:20:92:92:0d: > 01:06:e5:cc:1f:c1:bd:2d:a1:ab:4f:32:24:24:8f:f1: > ba:1e:12:7a:fb:ea:27:af:85:04:0e:19:e0:00:ff:a3: > b1:c2:60:7d:f8:76:de:1d:a8:43:af:7e:af:78:ea:4a: > 37:21:b0:3d:df:21:98:64:53:8b:e4:8a:31:94:f4:b4: > 55:de:fd:ad:64:68:d3:a9:6d:c7:d9:ba:42:66:c0:a9: > ea:9e:8a:92:8c:8e:3a:e9:79:ad:e2:c4:e0:8b:d7:02 > Fingerprint (MD5): > 6B:C7:5E:6E:E9:5D:7F:DE:84:B7:E1:FD:F5:8F:82:A4 > Fingerprint (SHA1): > B8:C9:71:A6:38:AA:1E:DA:C4:0F:4D:33:B0:7B:A3:79:C1:FD:09:20 > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #2355: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -t RootCA - PASSED >chains.sh: Creating DB TrustOnlyDB >certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd >chains.sh: #2356: TrustAnchors: Creating DB TrustOnlyDB - PASSED >chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -t RootCA.der >vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171742 (0x123fcf5e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:16:56 2013 > Not After : Wed Mar 07 00:16:56 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > f1:54:2c:9f:4c:73:1d:c3:9c:65:6f:fd:6f:59:b7:d9: > 02:4d:2c:be:6f:ac:f3:49:40:fb:5e:15:2b:27:8e:23: > 22:19:e2:a3:84:28:78:56:dc:84:e1:d2:24:c8:2f:30: > 4b:45:35:c3:7f:03:ec:98:04:06:39:82:67:d2:b3:d4: > d5:83:d9:f3:20:c7:ec:04:c9:24:b4:d6:11:be:3b:00: > 0c:58:39:f4:98:98:c8:36:d3:db:39:07:34:20:39:c6: > 5e:78:0d:fe:85:92:3a:61:87:fa:9e:ed:93:38:79:30: > db:c4:6f:f3:f9:aa:72:bd:dc:72:1c:a6:b0:e9:65:d3 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > ba:59:a4:e9:b7:63:ce:52:3e:3f:c5:f6:47:c4:c9:98: > 22:90:99:b0:ef:d5:da:8a:00:fb:1e:fd:20:92:92:0d: > 01:06:e5:cc:1f:c1:bd:2d:a1:ab:4f:32:24:24:8f:f1: > ba:1e:12:7a:fb:ea:27:af:85:04:0e:19:e0:00:ff:a3: > b1:c2:60:7d:f8:76:de:1d:a8:43:af:7e:af:78:ea:4a: > 37:21:b0:3d:df:21:98:64:53:8b:e4:8a:31:94:f4:b4: > 55:de:fd:ad:64:68:d3:a9:6d:c7:d9:ba:42:66:c0:a9: > ea:9e:8a:92:8c:8e:3a:e9:79:ad:e2:c4:e0:8b:d7:02 > Fingerprint (MD5): > 6B:C7:5E:6E:E9:5D:7F:DE:84:B7:E1:FD:F5:8F:82:A4 > Fingerprint (SHA1): > B8:C9:71:A6:38:AA:1E:DA:C4:0F:4D:33:B0:7B:A3:79:C1:FD:09:20 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #2357: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -t CA2CA1.der >vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171744 (0x123fcf60) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:16:56 2013 > Not After : Wed Mar 07 00:16:56 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c2:a7:63:37:d6:19:b9:fe:f3:a5:87:71:5c:0d:a1:bb: > c0:54:dc:75:e6:d0:7b:14:9f:1b:45:15:bc:6f:49:d4: > b8:d2:ff:6b:8b:c2:95:3f:e3:d5:46:5f:71:9e:3a:ec: > 89:71:4e:48:f6:0e:c5:ff:87:27:26:a3:48:23:53:13: > dc:2a:42:e0:03:4c:bd:04:87:09:4d:97:f7:5c:a2:45: > 05:9b:e0:95:8c:fb:f0:cd:6c:50:dc:65:6f:90:ee:71: > b4:c7:84:f6:7d:16:e4:67:6a:ad:1e:9f:c3:6e:f8:2f: > 03:56:71:7f:1a:db:21:70:5a:79:50:e6:1d:df:52:77 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 0e:5d:6d:f7:8a:65:c5:90:d0:39:be:8f:34:47:c4:38: > e5:a9:27:76:ee:57:35:1a:5d:0a:11:4c:fc:c2:d2:98: > 06:83:10:bd:43:dd:2e:11:6f:56:df:2f:08:d5:05:a1: > e2:19:a1:2a:60:11:67:9b:96:43:b9:3d:37:3b:0c:e9: > 98:47:7c:09:0e:a1:e0:72:0d:d8:e5:ac:8f:88:f2:2f: > 3a:2a:50:cc:36:a2:e1:75:7d:5d:df:3c:b9:3b:fd:4f: > b0:f6:31:d7:65:f5:30:62:32:28:f1:15:42:1c:79:f1: > e7:9d:9c:8a:c5:10:ee:1d:80:4e:cf:7f:ca:90:da:37 > Fingerprint (MD5): > AE:13:7A:E4:11:7D:A9:6D:BD:CF:58:01:C7:E1:D8:E5 > Fingerprint (SHA1): > 6C:EC:AF:41:41:AF:4A:29:23:6E:D8:1E:CD:DD:78:E9:9C:2A:E6:41 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Returned value is 0, expected result is pass >chains.sh: #2358: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -t CA2CA1.der - PASSED >chains.sh: Creating DB TrustAndDBDB >certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd >chains.sh: #2359: TrustAnchors: Creating DB TrustAndDBDB - PASSED >chains.sh: Importing certificate RootCA.der to TrustAndDBDB database >certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der >chains.sh: #2360: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED >chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database >certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der >chains.sh: #2361: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED >chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB >vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171742 (0x123fcf5e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:16:56 2013 > Not After : Wed Mar 07 00:16:56 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > f1:54:2c:9f:4c:73:1d:c3:9c:65:6f:fd:6f:59:b7:d9: > 02:4d:2c:be:6f:ac:f3:49:40:fb:5e:15:2b:27:8e:23: > 22:19:e2:a3:84:28:78:56:dc:84:e1:d2:24:c8:2f:30: > 4b:45:35:c3:7f:03:ec:98:04:06:39:82:67:d2:b3:d4: > d5:83:d9:f3:20:c7:ec:04:c9:24:b4:d6:11:be:3b:00: > 0c:58:39:f4:98:98:c8:36:d3:db:39:07:34:20:39:c6: > 5e:78:0d:fe:85:92:3a:61:87:fa:9e:ed:93:38:79:30: > db:c4:6f:f3:f9:aa:72:bd:dc:72:1c:a6:b0:e9:65:d3 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > ba:59:a4:e9:b7:63:ce:52:3e:3f:c5:f6:47:c4:c9:98: > 22:90:99:b0:ef:d5:da:8a:00:fb:1e:fd:20:92:92:0d: > 01:06:e5:cc:1f:c1:bd:2d:a1:ab:4f:32:24:24:8f:f1: > ba:1e:12:7a:fb:ea:27:af:85:04:0e:19:e0:00:ff:a3: > b1:c2:60:7d:f8:76:de:1d:a8:43:af:7e:af:78:ea:4a: > 37:21:b0:3d:df:21:98:64:53:8b:e4:8a:31:94:f4:b4: > 55:de:fd:ad:64:68:d3:a9:6d:c7:d9:ba:42:66:c0:a9: > ea:9e:8a:92:8c:8e:3a:e9:79:ad:e2:c4:e0:8b:d7:02 > Fingerprint (MD5): > 6B:C7:5E:6E:E9:5D:7F:DE:84:B7:E1:FD:F5:8F:82:A4 > Fingerprint (SHA1): > B8:C9:71:A6:38:AA:1E:DA:C4:0F:4D:33:B0:7B:A3:79:C1:FD:09:20 > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #2362: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB - PASSED >chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -t OtherRoot.der >vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171746 (0x123fcf62) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" > Validity: > Not Before: Thu Mar 07 00:16:56 2013 > Not After : Wed Mar 07 00:16:56 2063 > Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b4:07:c7:55:07:49:6e:00:fe:e9:c6:98:70:3b:10: > 3b:ec:a4:38:64:ed:99:ce:f4:16:f5:7f:ea:c5:e5:88: > 5e:68:38:b2:47:66:95:89:3e:6d:cb:eb:97:bc:dc:bf: > 73:7b:e6:dd:57:bd:b7:a4:ad:aa:36:57:31:75:7f:98: > b4:fe:d7:0f:04:60:f3:00:98:6c:f6:9b:b7:55:78:c6: > f3:4c:15:a7:4c:d2:00:f6:41:ae:41:80:a3:f6:dd:19: > a8:8c:04:99:19:02:10:3e:1a:53:35:57:2b:6d:f7:26: > ca:67:07:0f:6d:3d:cb:44:ae:25:3e:58:c2:40:32:c9 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 7a:6d:32:52:5d:dc:b9:80:41:54:c2:96:ee:6a:39:84: > 4e:ae:b9:5e:39:9b:b4:55:8e:ff:de:98:07:ef:55:73: > 01:02:37:77:41:c0:d3:cb:d3:90:f1:6a:04:ce:5b:b6: > 9c:72:85:d3:35:7e:ff:70:dd:6f:e1:84:14:26:80:8c: > e9:5a:44:d0:38:ea:71:80:c3:57:cf:7b:b2:84:71:5c: > da:16:68:38:03:ca:bf:bf:df:ed:3b:43:25:3a:7b:09: > 63:52:47:6b:c9:41:5b:8c:6a:80:fb:4f:87:6b:ea:bd: > ce:27:21:ca:67:c4:4b:f8:eb:e0:f6:51:33:8d:27:91 > Fingerprint (MD5): > DF:4B:D6:F7:EC:80:41:31:D5:4E:4F:E9:9A:D0:F1:44 > Fingerprint (SHA1): > AF:0F:8F:D6:6F:A4:1A:7B:E0:DC:4F:5D:7A:87:CF:3A:15:CC:6F:D2 >Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" >Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate > ,C=US" >Returned value is 0, expected result is pass >chains.sh: #2363: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -t OtherRoot.der - PASSED >chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -T -d TrustAndDBDB -t OtherIntermediateOtherRoot.der -t OtherRoot.der >vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171742 (0x123fcf5e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:16:56 2013 > Not After : Wed Mar 07 00:16:56 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > f1:54:2c:9f:4c:73:1d:c3:9c:65:6f:fd:6f:59:b7:d9: > 02:4d:2c:be:6f:ac:f3:49:40:fb:5e:15:2b:27:8e:23: > 22:19:e2:a3:84:28:78:56:dc:84:e1:d2:24:c8:2f:30: > 4b:45:35:c3:7f:03:ec:98:04:06:39:82:67:d2:b3:d4: > d5:83:d9:f3:20:c7:ec:04:c9:24:b4:d6:11:be:3b:00: > 0c:58:39:f4:98:98:c8:36:d3:db:39:07:34:20:39:c6: > 5e:78:0d:fe:85:92:3a:61:87:fa:9e:ed:93:38:79:30: > db:c4:6f:f3:f9:aa:72:bd:dc:72:1c:a6:b0:e9:65:d3 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > ba:59:a4:e9:b7:63:ce:52:3e:3f:c5:f6:47:c4:c9:98: > 22:90:99:b0:ef:d5:da:8a:00:fb:1e:fd:20:92:92:0d: > 01:06:e5:cc:1f:c1:bd:2d:a1:ab:4f:32:24:24:8f:f1: > ba:1e:12:7a:fb:ea:27:af:85:04:0e:19:e0:00:ff:a3: > b1:c2:60:7d:f8:76:de:1d:a8:43:af:7e:af:78:ea:4a: > 37:21:b0:3d:df:21:98:64:53:8b:e4:8a:31:94:f4:b4: > 55:de:fd:ad:64:68:d3:a9:6d:c7:d9:ba:42:66:c0:a9: > ea:9e:8a:92:8c:8e:3a:e9:79:ad:e2:c4:e0:8b:d7:02 > Fingerprint (MD5): > 6B:C7:5E:6E:E9:5D:7F:DE:84:B7:E1:FD:F5:8F:82:A4 > Fingerprint (SHA1): > B8:C9:71:A6:38:AA:1E:DA:C4:0F:4D:33:B0:7B:A3:79:C1:FD:09:20 > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #2364: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -T -d TrustAndDBDB -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED >chains.sh: Creating DB ExplicitDistrustDB >certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd >chains.sh: #2365: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED >chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database >certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der >chains.sh: #2366: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED >chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database >certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der >chains.sh: #2367: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED >chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database >certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der >chains.sh: #2368: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED >chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -t CA1RootCA.der >vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. CA1 [Certificate Authority]: > ERROR -8171: Peer's certificate has been marked as not trusted by the user. >Returned value is 1, expected result is fail >chains.sh: #2369: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -t CA1RootCA.der - PASSED >trying to kill httpserv with PID 20505 at Wed Mar 6 17:16:58 MST 2013 >kill -USR1 20505 >selfserv: normal termination >httpserv -b -p 9228 2>/dev/null; >httpserv with PID 20505 killed at Wed Mar 6 17:16:58 MST 2013 >TIMESTAMP chains END: Wed Mar 6 17:16:58 MST 2013 >chains.sh: Testing with PKIX =============================== >Running tests for lowhash >TIMESTAMP lowhash BEGIN: Wed Mar 6 17:16:58 MST 2013 >lowhash.sh: Lowhash Tests - /proc/sys/crypto/fips_enabled is 0 =============================== >freebl lowhash not supported in this plaform. >lowhash.sh done >TIMESTAMP lowhash END: Wed Mar 6 17:16:58 MST 2013 >Running tests for libpkix >TIMESTAMP libpkix BEGIN: Wed Mar 6 17:16:58 MST 2013 >TIMESTAMP libpkix END: Wed Mar 6 17:16:58 MST 2013 >Running tests for cert >TIMESTAMP cert BEGIN: Wed Mar 6 17:16:58 MST 2013 >cert.sh: Certutil and Crlutil Tests =============================== >cert.sh: #2370: Looking for root certs module. - PASSED >cert.sh: Creating a CA Certificate TestCA ========================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/CA >cert.sh: Creating CA Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/CA -f ../tests.pw >cert.sh: #2371: Creating CA Cert DB - PASSED >cert.sh: Loading root cert module to CA Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/CA >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #2372: Loading root cert module to CA Cert DB - PASSED >cert.sh: Certificate initialized ---------- >cert.sh: Creating CA Cert TestCA -------------------------- >certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >cert.sh: #2373: Creating CA Cert TestCA - PASSED >cert.sh: Exporting Root Cert -------------------------- >certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/CA -o root.cert >cert.sh: #2374: Exporting Root Cert - PASSED >cert.sh: Creating a CA Certificate serverCA ========================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/serverCA >cert.sh: Creating CA Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -f ../tests.pw >cert.sh: #2375: Creating CA Cert DB - PASSED >cert.sh: Loading root cert module to CA Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/serverCA >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #2376: Loading root cert module to CA Cert DB - PASSED >cert.sh: Certificate initialized ---------- >cert.sh: Creating CA Cert serverCA -------------------------- >certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >cert.sh: #2377: Creating CA Cert serverCA - PASSED >cert.sh: Exporting Root Cert -------------------------- >certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -o root.cert >cert.sh: #2378: Exporting Root Cert - PASSED >cert.sh: Creating a CA Certificate chain-1-serverCA ========================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/serverCA >cert.sh: Creating CA Cert chain-1-serverCA -------------------------- >certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >cert.sh: #2379: Creating CA Cert chain-1-serverCA - PASSED >cert.sh: Exporting Root Cert -------------------------- >certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -o root.cert >cert.sh: #2380: Exporting Root Cert - PASSED >cert.sh: Creating a CA Certificate chain-2-serverCA ========================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/serverCA >cert.sh: Creating CA Cert chain-2-serverCA -------------------------- >certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >cert.sh: #2381: Creating CA Cert chain-2-serverCA - PASSED >cert.sh: Exporting Root Cert -------------------------- >certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -o root.cert >cert.sh: #2382: Exporting Root Cert - PASSED >cert.sh: Creating a CA Certificate clientCA ========================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/clientCA >cert.sh: Creating CA Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -f ../tests.pw >cert.sh: #2383: Creating CA Cert DB - PASSED >cert.sh: Loading root cert module to CA Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/clientCA >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #2384: Loading root cert module to CA Cert DB - PASSED >cert.sh: Certificate initialized ---------- >cert.sh: Creating CA Cert clientCA -------------------------- >certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >cert.sh: #2385: Creating CA Cert clientCA - PASSED >cert.sh: Exporting Root Cert -------------------------- >certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -o root.cert >cert.sh: #2386: Exporting Root Cert - PASSED >cert.sh: Creating a CA Certificate chain-1-clientCA ========================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/clientCA >cert.sh: Creating CA Cert chain-1-clientCA -------------------------- >certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >cert.sh: #2387: Creating CA Cert chain-1-clientCA - PASSED >cert.sh: Exporting Root Cert -------------------------- >certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -o root.cert >cert.sh: #2388: Exporting Root Cert - PASSED >cert.sh: Creating a CA Certificate chain-2-clientCA ========================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/clientCA >cert.sh: Creating CA Cert chain-2-clientCA -------------------------- >certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >cert.sh: #2389: Creating CA Cert chain-2-clientCA - PASSED >cert.sh: Exporting Root Cert -------------------------- >certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -o root.cert >cert.sh: #2390: Exporting Root Cert - PASSED >cert.sh: Creating Certificates, issued by the last =============== > of a chain of CA's which are not in the same database============ >Server Cert >cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw >cert.sh: #2391: Initializing localhost.localdomain's Cert DB (ext.) - PASSED >cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/ext_server >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #2392: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED >cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- >certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2393: Generate Cert Request for localhost.localdomain (ext) - PASSED >cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- >certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw >cert.sh: #2394: Sign localhost.localdomain's Request (ext) - PASSED >cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- >certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain.cert >cert.sh: #2395: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED >cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- >certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert >cert.sh: #2396: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED >Importing all the server's own CA chain into the servers DB >cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- >certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA.ca.cert >cert.sh: #2397: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED >cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- >certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA.ca.cert >cert.sh: #2398: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED >cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- >certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert >cert.sh: #2399: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED >Client Cert >cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw >cert.sh: #2400: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED >cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/ext_client >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #2401: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED >cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- >certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2402: Generate Cert Request for ExtendedSSLUser (ext) - PASSED >cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- >certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw >cert.sh: #2403: Sign ExtendedSSLUser's Request (ext) - PASSED >cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- >certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser.cert >cert.sh: #2404: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED >cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- >certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert >cert.sh: #2405: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED >Importing all the client's own CA chain into the servers DB >cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- >certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert >cert.sh: #2406: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED >cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- >certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA.ca.cert >cert.sh: #2407: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED >cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- >certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA.ca.cert >cert.sh: #2408: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED >cert.sh SUCCESS: EXT passed >cert.sh: Creating Client CA Issued Certificates =============== >cert.sh: Initializing TestUser's Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw >cert.sh: #2409: Initializing TestUser's Cert DB - PASSED >cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #2410: Loading root cert module to TestUser's Cert DB - PASSED >cert.sh: Import Root CA for TestUser -------------------------- >certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA.ca.cert >cert.sh: #2411: Import Root CA for TestUser - PASSED >cert.sh: Generate Cert Request for TestUser -------------------------- >certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2412: Generate Cert Request for TestUser - PASSED >cert.sh: Sign TestUser's Request -------------------------- >certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw >cert.sh: #2413: Sign TestUser's Request - PASSED >cert.sh: Import TestUser's Cert -------------------------- >certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser.cert >cert.sh: #2414: Import TestUser's Cert - PASSED >cert.sh SUCCESS: TestUser's Cert Created >cert.sh: Creating Server CA Issued Certificate for \ > localhost.localdomain ------------------------------------ >cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw >cert.sh: #2415: Initializing localhost.localdomain's Cert DB - PASSED >cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #2416: Loading root cert module to localhost.localdomain's Cert DB - PASSED >cert.sh: Import Root CA for localhost.localdomain -------------------------- >certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA.ca.cert >cert.sh: #2417: Import Root CA for localhost.localdomain - PASSED >cert.sh: Generate Cert Request for localhost.localdomain -------------------------- >certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2418: Generate Cert Request for localhost.localdomain - PASSED >cert.sh: Sign localhost.localdomain's Request -------------------------- >certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw >cert.sh: #2419: Sign localhost.localdomain's Request - PASSED >cert.sh: Import localhost.localdomain's Cert -------------------------- >certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain.cert >cert.sh: #2420: Import localhost.localdomain's Cert - PASSED >cert.sh SUCCESS: localhost.localdomain's Cert Created >cert.sh: Creating Server CA Issued Certificate for \ > localhost.localdomain-sni -------------------------------- >cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- >certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2421: Generate Cert Request for localhost-sni.localdomain - PASSED >cert.sh: Sign localhost-sni.localdomain's Request -------------------------- >certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw >cert.sh: #2422: Sign localhost-sni.localdomain's Request - PASSED >cert.sh: Import localhost-sni.localdomain's Cert -------------------------- >certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain.cert >cert.sh: #2423: Import localhost-sni.localdomain's Cert - PASSED >cert.sh SUCCESS: localhost-sni.localdomain's Cert Created >cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- >certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw >cert.sh: #2424: Modify trust attributes of Root CA -t TC,TC,TC - PASSED >cert.sh SUCCESS: SSL passed >cert.sh: Creating Client CA Issued Certificates ============== >cert.sh: Initializing Alice's Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw >cert.sh: #2425: Initializing Alice's Cert DB - PASSED >cert.sh: Loading root cert module to Alice's Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/alicedir >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #2426: Loading root cert module to Alice's Cert DB - PASSED >cert.sh: Import Root CA for Alice -------------------------- >certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA.ca.cert >cert.sh: #2427: Import Root CA for Alice - PASSED >cert.sh: Generate Cert Request for Alice -------------------------- >certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2428: Generate Cert Request for Alice - PASSED >cert.sh: Sign Alice's Request -------------------------- >certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw >cert.sh: #2429: Sign Alice's Request - PASSED >cert.sh: Import Alice's Cert -------------------------- >certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice.cert >cert.sh: #2430: Import Alice's Cert - PASSED >cert.sh SUCCESS: Alice's Cert Created >cert.sh: Initializing Bob's Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw >cert.sh: #2431: Initializing Bob's Cert DB - PASSED >cert.sh: Loading root cert module to Bob's Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/bobdir >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #2432: Loading root cert module to Bob's Cert DB - PASSED >cert.sh: Import Root CA for Bob -------------------------- >certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA.ca.cert >cert.sh: #2433: Import Root CA for Bob - PASSED >cert.sh: Generate Cert Request for Bob -------------------------- >certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2434: Generate Cert Request for Bob - PASSED >cert.sh: Sign Bob's Request -------------------------- >certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw >cert.sh: #2435: Sign Bob's Request - PASSED >cert.sh: Import Bob's Cert -------------------------- >certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob.cert >cert.sh: #2436: Import Bob's Cert - PASSED >cert.sh SUCCESS: Bob's Cert Created >cert.sh: Creating Dave's Certificate ------------------------- >cert.sh: Initializing Dave's Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/dave -f ../tests.pw >cert.sh: #2437: Initializing Dave's Cert DB - PASSED >cert.sh: Loading root cert module to Dave's Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/dave >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #2438: Loading root cert module to Dave's Cert DB - PASSED >cert.sh: Import Root CA for Dave -------------------------- >certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA.ca.cert >cert.sh: #2439: Import Root CA for Dave - PASSED >cert.sh: Generate Cert Request for Dave -------------------------- >certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2440: Generate Cert Request for Dave - PASSED >cert.sh: Sign Dave's Request -------------------------- >certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw >cert.sh: #2441: Sign Dave's Request - PASSED >cert.sh: Import Dave's Cert -------------------------- >certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave.cert >cert.sh: #2442: Import Dave's Cert - PASSED >cert.sh SUCCESS: Dave's Cert Created >cert.sh: Creating multiEmail's Certificate -------------------- >cert.sh: Initializing Eve's Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/eve -f ../tests.pw >cert.sh: #2443: Initializing Eve's Cert DB - PASSED >cert.sh: Loading root cert module to Eve's Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/eve >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #2444: Loading root cert module to Eve's Cert DB - PASSED >cert.sh: Import Root CA for Eve -------------------------- >certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA.ca.cert >cert.sh: #2445: Import Root CA for Eve - PASSED >cert.sh: Generate Cert Request for Eve -------------------------- >certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2446: Generate Cert Request for Eve - PASSED >cert.sh: Sign Eve's Request -------------------------- >certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com >cert.sh: #2447: Sign Eve's Request - PASSED >cert.sh: Import Eve's Cert -------------------------- >certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve.cert >cert.sh: #2448: Import Eve's Cert - PASSED >cert.sh SUCCESS: Eve's Cert Created >cert.sh: Importing Certificates ============================== >cert.sh: Import Bob's cert into Alice's db -------------------------- >certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert >cert.sh: #2449: Import Bob's cert into Alice's db - PASSED >cert.sh: Import Dave's cert into Alice's DB -------------------------- >certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert >cert.sh: #2450: Import Dave's cert into Alice's DB - PASSED >cert.sh: Import Dave's cert into Bob's DB -------------------------- >certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert >cert.sh: #2451: Import Dave's cert into Bob's DB - PASSED >cert.sh: Import Eve's cert into Alice's DB -------------------------- >certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert >cert.sh: #2452: Import Eve's cert into Alice's DB - PASSED >cert.sh: Import Eve's cert into Bob's DB -------------------------- >certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert >cert.sh: #2453: Import Eve's cert into Bob's DB - PASSED >cert.sh SUCCESS: SMIME passed >cert.sh: Creating FIPS 140 DSA Certificates ============== >cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw >cert.sh: #2454: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED >cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #2455: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED >cert.sh: Enable FIPS mode on database ----------------------- >modutil -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips -fips true >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >FIPS mode enabled. >cert.sh: #2456: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED >cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- >certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise >Generating key. This may take a few moments... >cert.sh: #2457: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED >cert.sh SUCCESS: FIPS passed >cert.sh: Initializing TestExt's Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw >cert.sh: #2458: Initializing TestExt's Cert DB - PASSED >cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #2459: Loading root cert module to TestExt's Cert DB - PASSED >cert.sh: Import Root CA for TestExt -------------------------- >certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA.ca.cert >cert.sh: #2460: Import Root CA for TestExt - PASSED >cert.sh: Generate Cert Request for TestExt -------------------------- >certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2461: Generate Cert Request for TestExt - PASSED >cert.sh: Sign TestExt's Request -------------------------- >certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw >cert.sh: #2462: Sign TestExt's Request - PASSED >cert.sh: Import TestExt's Cert -------------------------- >certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt.cert >cert.sh: #2463: Import TestExt's Cert - PASSED >cert.sh SUCCESS: TestExt's Cert Created >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args >certutil options: >0 >1 >2 >3 >4 >5 >6 >10 >n >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt1 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:54:08 > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View > ,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:17:03 2013 > Not After : Fri Jun 07 00:17:03 2013 > Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie > w,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c3:f4:e8:fd:30:d7:0a:61:27:83:8c:a6:f3:3d:b9:76: > f8:93:06:06:c8:7b:17:1a:11:0b:8d:2b:64:92:01:ef: > ee:3c:55:b0:24:72:be:eb:0e:76:a7:b1:46:b9:a0:e3: > a9:70:63:10:40:b9:7b:cb:4c:71:e2:c4:62:79:5d:09: > 63:a7:de:2c:2a:32:63:c3:46:60:d0:44:5c:ca:9d:db: > c7:1c:41:b6:fc:11:50:f5:4e:3d:ab:ec:62:aa:ac:32: > 59:b4:b7:d9:a2:7b:2e:b0:73:3a:85:55:ff:8c:9f:9b: > ce:81:d2:8f:7e:39:d4:41:98:59:60:f0:f1:91:d7:b7 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Key Usage > Usages: Digital Signature > Non-Repudiation > Key Encipherment > Data Encipherment > Key Agreement > Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 45:74:08:70:78:29:0c:e1:6c:98:51:e6:ce:ef:8f:d5: > 20:77:e6:90:e6:87:3d:1f:4b:09:ad:ae:0c:8c:e7:ac: > 11:21:45:89:84:eb:91:c3:7a:6b:c5:8c:eb:51:a0:28: > 45:5d:fe:be:56:61:b5:2c:a8:bb:21:b5:c3:b9:53:7e: > f9:84:9d:f6:51:13:e1:7f:aa:5a:eb:38:8d:97:c3:c0: > 0f:5b:40:f3:bb:7c:28:4f:19:a2:4d:7c:7f:3f:90:1c: > 76:be:5e:e7:ee:37:32:38:24:34:e0:06:ab:6a:c5:56: > 46:f8:f4:80:cd:71:4e:ab:bd:cd:63:4b:df:51:10:94 > Fingerprint (MD5): > 2C:3E:61:75:B4:9A:0F:09:41:0C:64:74:66:52:9C:A9 > Fingerprint (SHA1): > 1C:D5:CB:BF:02:53:20:EB:04:94:22:48:76:37:BA:87:B3:87:18:BF > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #2464: Certificate Key Usage Extension (1) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args >certutil options: >0 >1 >2 >3 >4 >5 >6 >10 >y >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt2 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:54:09 > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View > ,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:17:03 2013 > Not After : Fri Jun 07 00:17:03 2013 > Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie > w,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b3:96:39:0c:df:04:4d:bd:af:74:e5:33:12:3a:eb:11: > 30:14:b7:82:00:59:44:77:4f:09:79:98:a7:2f:13:3a: > 3c:7d:00:77:22:75:21:d4:bf:ed:bf:4a:d0:d8:d0:dc: > 8c:33:25:ee:ef:6f:bc:75:e0:09:8f:91:e1:55:42:97: > a5:da:ed:58:fd:44:2a:7c:e9:68:53:39:05:e1:da:88: > 36:14:10:4d:9f:43:3d:c0:69:5a:83:e1:87:a1:5d:52: > b6:75:31:7b:94:b1:80:46:88:11:9f:30:0f:32:d9:ea: > f8:52:a5:0f:e8:d9:5f:67:1c:b7:5b:69:63:2c:96:09 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Key Usage > Critical: True > Usages: Digital Signature > Non-Repudiation > Key Encipherment > Data Encipherment > Key Agreement > Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 81:81:58:68:f6:cc:ff:73:d2:f1:07:72:3e:61:3a:3f: > b9:43:ce:44:f7:f0:2d:d0:98:7c:fb:4d:11:c4:91:fe: > 1d:82:24:8f:43:20:89:ae:8a:3b:86:40:bd:15:1f:56: > e4:f2:ec:1f:d0:5c:33:61:c8:86:83:9d:07:f1:58:26: > 7e:b9:6e:44:f4:20:d2:61:c3:82:fa:a6:56:e6:2e:af: > 97:ea:a8:93:ed:fa:b1:db:25:30:74:91:d2:f0:fe:0e: > 7e:b9:4d:4a:7d:a8:ae:bc:30:c4:04:52:78:94:18:e1: > 7f:4d:56:03:3a:84:b5:6b:8c:a3:5d:f1:fc:56:69:74 > Fingerprint (MD5): > B1:49:EE:A0:E2:A6:DD:1D:DF:D9:9A:84:E0:EF:F6:F2 > Fingerprint (SHA1): > 93:F8:FD:45:98:3F:7A:A8:07:1C:92:99:85:D8:56:2B:B2:C3:2C:46 > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #2465: Certificate Key Usage Extension (2) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args >certutil options: >y >-1 >n >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt3 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:54:09 > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View > ,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:17:03 2013 > Not After : Fri Jun 07 00:17:03 2013 > Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie > w,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c4:fa:7c:d9:6f:90:ba:44:88:43:59:e3:cb:f3:88:3a: > 24:fa:c3:51:b9:d3:07:b3:56:80:6c:f3:cc:34:b4:0b: > 20:c2:2b:eb:d2:9c:42:7a:7f:dd:78:e8:f9:30:fc:1d: > 31:7e:c2:91:69:02:0b:51:f6:98:f1:ee:77:14:5c:56: > bc:71:b4:af:05:db:6a:1a:ab:22:a6:3a:d3:ec:52:2a: > 81:f5:06:4a:97:9b:6f:32:03:49:28:61:27:f6:e3:fe: > 4e:c7:1a:fb:cf:b4:7c:dd:cf:68:77:fa:bb:d8:32:b0: > 62:c5:8e:8a:f9:f8:7d:e8:17:85:f8:bb:2e:d7:1d:5b > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2b:72:68:69:a1:d5:e2:fc:3c:8a:ce:94:e1:c1:0c:98: > 4a:9c:e1:8e:21:89:ed:a3:61:e9:e2:d0:7b:cb:46:77: > 84:b9:1c:b9:2c:13:14:ca:df:24:89:59:69:2f:b5:7d: > 7b:94:e8:77:4c:5e:9d:6d:91:1f:fa:26:b0:71:8c:bd: > 1f:ba:8d:02:c5:cf:4a:cb:9a:06:55:78:89:9a:82:9a: > cd:92:3a:d6:6f:df:d9:1c:c5:69:36:f3:90:a7:1b:f3: > f4:d3:dc:27:0a:2d:83:0e:90:b3:6b:9f:7b:73:aa:3c: > 9b:fc:77:79:f8:bb:03:03:28:ce:e7:ba:30:ba:f3:1e > Fingerprint (MD5): > D4:98:F3:F9:F8:A4:64:7C:07:FE:99:7F:E0:3E:6C:5C > Fingerprint (SHA1): > CF:88:FE:FE:BF:5A:52:2A:BF:F1:98:0B:CC:E3:A7:4A:00:02:60:74 > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #2466: Certificate Basic Constraints Extension (3) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args >certutil options: >n >-1 >y >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt4 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:54:0a > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View > ,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:17:04 2013 > Not After : Fri Jun 07 00:17:04 2013 > Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie > w,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d5:05:db:8f:c6:64:83:cf:b6:06:ef:28:80:13:39:0f: > 3b:5d:f7:77:2d:ad:00:83:34:a9:6c:e5:da:2a:7a:51: > 5e:0a:f2:bd:75:0d:04:7c:8e:1b:83:21:fa:2f:0b:2c: > a0:de:d3:8a:09:19:63:74:f0:38:f7:ba:2d:e3:33:3c: > 98:2d:40:4b:21:c3:45:f6:36:1d:a1:70:ec:df:8b:cb: > 7e:82:7b:33:8c:2f:c0:ff:e4:a7:a1:ff:36:8f:8d:58: > 0f:5a:62:48:ce:3f:8b:3c:d9:10:33:e5:fe:27:d8:9e: > 73:66:01:6b:67:39:4f:70:6a:49:1f:33:89:5e:cd:81 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is not a CA. > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 48:08:83:7f:5d:78:48:ad:42:ba:b1:60:fa:99:42:83: > ab:9d:00:33:a9:a5:30:f3:8b:fa:9e:dc:f0:31:ed:13: > e5:23:96:88:92:f9:89:05:8d:76:d3:71:56:81:6b:17: > 0c:03:bb:64:86:ca:18:e5:5c:4a:a7:f5:88:3a:9a:2d: > a2:ac:51:66:d6:a3:a9:94:9d:bf:6b:e5:d0:22:22:e7: > 8c:3c:48:47:f9:7c:d3:68:e5:10:aa:be:59:b4:32:82: > 3e:00:90:54:da:ad:f8:c8:f5:6b:b0:f9:7d:1d:ee:74: > 6f:55:7e:23:7a:56:5a:94:cc:4d:47:3c:8d:17:42:e7 > Fingerprint (MD5): > C4:9E:B4:6C:DD:21:A0:A8:AF:CA:11:AC:0B:24:45:5F > Fingerprint (SHA1): > E2:C3:52:B5:76:7C:81:61:EA:9F:F7:AD:F9:19:EC:36:AD:77:10:FF > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #2467: Certificate Basic Constraints Extension (4) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args >certutil options: >y >12341235123 >y >Generating key. This may take a few moments... >Enter value for the authKeyID extension [y/N]? >Enter value for the key identifier fields,enter to omit: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Enter value for the authCertSerial field, enter to omit: >Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt5 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:54:0a > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View > ,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:17:04 2013 > Not After : Fri Jun 07 00:17:04 2013 > Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie > w,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > cd:f1:4d:61:73:45:ff:bc:b2:7d:fe:41:13:09:22:88: > 3b:ef:6c:ae:05:7b:a6:dc:1c:ba:97:41:c9:f5:b7:13: > 05:fb:ec:49:7f:5f:9f:d1:96:a6:4c:bb:c0:0a:75:60: > 33:e6:4e:ad:98:a3:c2:e4:cb:fb:34:e4:59:f5:e3:2f: > 7f:c7:2f:d7:d1:0e:d1:ce:55:aa:93:43:49:a3:d9:c5: > ce:b7:5a:38:f9:a3:06:03:4f:fc:fc:b9:8b:7c:df:5a: > 46:2c:ce:b9:35:4e:97:bb:f9:02:c4:9a:32:91:62:79: > e4:ad:e2:a3:2e:e0:77:f2:6b:32:4b:ef:c3:1f:b7:35 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Authority Key Identifier > Critical: True > Key ID: > 12341235123 > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > c5:47:88:ab:15:7c:bb:c2:4f:44:b6:a9:65:31:d9:fe: > ff:6f:56:e7:0a:2a:74:19:4a:64:aa:e4:aa:7b:bc:45: > 0a:09:3f:ce:d2:dd:47:53:ea:2e:22:1d:23:09:4d:77: > 37:b6:a7:41:1a:19:f9:4b:9b:89:94:2a:50:69:df:ad: > fa:e6:00:33:5a:7e:29:dc:08:bc:c0:0d:15:f6:19:e8: > 32:1a:97:95:d4:fd:bf:c4:f3:a5:75:4e:91:0d:9a:5c: > 87:c6:d7:40:13:84:b0:af:88:c7:a0:7c:70:dd:54:17: > 6e:de:83:bc:3c:63:53:ee:3a:74:ab:15:2c:bd:4a:0a > Fingerprint (MD5): > 3A:09:7A:0C:14:B1:AC:BA:90:92:D5:A5:48:47:AA:D2 > Fingerprint (SHA1): > 7E:F5:B8:BB:CC:CD:01:26:08:AA:15:88:52:C3:08:8B:28:F1:63:2C > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #2468: Certificate Authority Key Identifier Extension (5) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args >certutil options: >y >3 >test.com >214123 >y >Generating key. This may take a few moments... >Enter value for the authKeyID extension [y/N]? >Enter value for the key identifier fields,enter to omit: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Enter value for the authCertSerial field, enter to omit: >Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt6 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:54:0a > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View > ,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:17:04 2013 > Not After : Fri Jun 07 00:17:04 2013 > Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie > w,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bd:d4:aa:bd:13:6f:64:ae:f8:32:4a:6c:23:e2:f5:82: > fd:bf:5d:2c:e2:75:06:69:b0:88:fe:b9:5e:ea:8e:29: > e4:b3:5a:5d:eb:51:bd:85:2a:84:90:73:2d:d8:69:a6: > 91:9e:d8:ed:48:ac:dd:c4:16:d7:f4:05:b5:10:22:5b: > 4e:52:86:70:09:f6:f1:4f:69:79:93:ee:75:c1:0c:1d: > c0:16:9c:ab:14:69:3c:ed:53:81:ce:94:2e:66:a9:0e: > 57:bf:ba:fb:e2:7b:6c:32:8f:fc:2f:58:4d:e8:6c:c6: > c6:ed:b6:9c:f3:4b:f9:58:d6:f5:09:61:be:52:83:53 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Authority Key Identifier > Critical: True > Issuer: > DNS name: "test.com" > Serial Number: > 214123 > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 19:d8:24:49:5a:a7:e7:cb:06:bb:d9:53:55:8d:28:6d: > 94:5a:5f:3b:89:fb:c7:19:ad:6e:1c:38:b3:4a:f8:a4: > ac:b7:e7:cf:02:fe:d5:87:53:fa:7a:d8:8c:d6:44:3a: > 2d:4f:2e:3e:9f:dc:7d:d1:63:33:e9:1c:60:34:43:cb: > b9:fd:1a:5a:04:d9:41:d9:e4:a2:96:8d:d1:97:a8:c1: > fe:3f:e4:fa:8c:02:1a:8b:a7:aa:ff:54:61:dd:fa:d4: > 6a:b0:06:9c:e6:fb:40:36:83:45:88:56:ac:a4:d5:39: > f1:29:f3:ee:67:d1:83:cc:9b:98:83:73:6a:fb:d7:a1 > Fingerprint (MD5): > E2:05:B4:3D:87:FB:DC:FE:46:BB:46:9D:F9:6A:E7:5C > Fingerprint (SHA1): > 0D:1B:D7:A7:2F:BF:E6:7E:76:2C:C4:8D:EA:CA:AD:70:AA:4B:C4:C8 > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #2469: Certificate Authority Key Identifier Extension (6) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args >certutil options: >1 >2 >rfc822@name.tld >3 >test.com >8 >1.2.3.4 >9 >OID.0.2.213 >10 >0 >10 >n >n >Generating key. This may take a few moments... >Enter the type of the distribution point name: > 1 - Full Name > 2 - Relative Name > Any other number to finish > Choice: > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Select one of the following for the reason flags > 0 - unused > 1 - keyCompromise > 2 - caCompromise > 3 - affiliationChanged > 4 - superseded > 5 - cessationOfOperation > 6 - certificateHold > Any other number to finish Choice: > Enter value for the CRL Issuer name: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? >Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt7 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:54:0b > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View > ,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:17:04 2013 > Not After : Fri Jun 07 00:17:04 2013 > Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie > w,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d4:45:06:dd:da:7e:8c:ba:f3:db:fe:9b:98:59:22:02: > 58:49:be:66:4a:b1:ba:9a:c2:d2:28:99:01:81:ae:a8: > 7b:53:48:aa:ac:08:7a:40:86:ad:5f:0e:50:7c:b3:b9: > 8d:c3:44:b5:71:d8:f1:01:88:0b:cf:20:d2:25:80:51: > bc:95:a6:00:70:83:b5:64:cd:e6:dd:48:ce:fe:c8:0e: > ff:48:dc:72:5f:86:70:99:0c:5e:bb:98:5e:1f:8a:d3: > 16:67:65:0f:59:50:b8:d7:c8:55:47:d2:4a:9c:a7:4d: > 13:1f:9c:88:af:48:42:1d:25:7a:24:99:09:10:29:cf > Exponent: 65537 (0x10001) > Signed Extensions: > Name: CRL Distribution Points > Distribution point: > RFC822 Name: "rfc822@name.tld" > DNS name: "test.com" > IP Address: > 87:07:31:2e:32:2e:33:2e:34 > Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 > Reasons: > 80 > (7 least significant bits unused) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 4b:6c:dc:cf:2a:99:b6:ef:4a:7f:e5:59:82:84:e1:47: > e4:0c:8a:91:ba:27:6d:7c:bd:6b:1d:8b:d6:03:0b:ea: > 15:38:6b:74:c2:3a:ff:37:2b:71:7d:84:25:d1:7c:67: > f6:62:4e:40:5a:35:97:76:bb:45:91:c8:e1:f5:63:fb: > 26:f9:92:f6:e0:3b:16:32:12:fc:67:4b:9b:36:07:dc: > ba:37:6e:bf:13:d3:ce:ba:41:c3:c9:6a:1a:0d:5d:56: > aa:e2:97:ac:91:ae:c6:d2:a6:43:1e:6d:e4:7e:65:57: > 21:83:8a:2a:51:5e:cb:ce:3a:dc:c6:0b:36:3b:27:d7 > Fingerprint (MD5): > 5B:1C:A0:11:8A:26:A8:82:5C:8C:C7:BE:59:C3:C5:C3 > Fingerprint (SHA1): > 48:84:26:8D:88:B8:DE:F4:F1:21:48:62:A3:3D:A4:2E:B3:5B:75:29 > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #2470: CRL Distribution Points Extension (7) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args >certutil options: >2 >SN=asdfsdf >4 >3 >test.com >10 >n >n >Generating key. This may take a few moments... >Enter the type of the distribution point name: > 1 - Full Name > 2 - Relative Name > Any other number to finish > Choice: > Enter the relative name: >Select one of the following for the reason flags > 0 - unused > 1 - keyCompromise > 2 - caCompromise > 3 - affiliationChanged > 4 - superseded > 5 - cessationOfOperation > 6 - certificateHold > Any other number to finish Choice: > Enter value for the CRL Issuer name: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? >Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt8 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:54:0c > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View > ,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:17:05 2013 > Not After : Fri Jun 07 00:17:05 2013 > Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie > w,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > be:a9:0a:5b:4f:b3:83:f9:16:30:e6:db:96:32:69:96: > 08:b6:81:f6:ff:c1:70:15:8b:9e:6f:bb:26:77:95:b9: > 2e:c4:d5:67:d4:cb:b2:55:e8:93:26:2b:15:f3:d8:b0: > 6d:cc:67:b1:65:b2:a6:9a:f1:63:e5:20:9e:2d:bc:54: > 90:a3:b8:2c:a3:1b:cb:29:ba:89:53:ee:d2:66:29:44: > 27:48:4e:95:4a:23:bb:35:c1:0f:7d:d7:bc:f4:35:d9: > ac:f1:47:83:27:95:3d:6c:d0:a8:7d:97:76:a0:d3:e1: > 9c:25:72:ba:bc:f6:85:11:6d:d4:11:4a:01:1c:4b:fb > Exponent: 65537 (0x10001) > Signed Extensions: > Name: CRL Distribution Points > Distribution point: > RDN: "SN=asdfsdf" > Reasons: > 08 > (7 least significant bits unused) > CRL issuer: > DNS name: "test.com" > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 48:96:e2:78:1d:1a:07:84:48:d4:29:9b:6e:80:6a:2d: > 07:dd:65:74:85:af:87:46:b4:af:fa:9d:82:42:8a:88: > e2:2c:0d:84:e8:a2:94:62:3d:d0:fa:83:ab:e1:c5:45: > 87:7f:28:41:0a:11:b8:3d:3d:a5:ee:26:5d:e8:d4:45: > bb:4f:f6:54:11:de:c0:d2:e3:73:c7:37:47:4c:d7:aa: > 1c:45:6c:eb:8f:8f:ac:dd:82:0d:5e:36:a7:6a:c7:06: > 75:59:6c:aa:92:ef:cc:93:43:ef:f4:22:35:89:c2:84: > e6:32:c7:be:4c:2c:ac:21:22:2e:81:67:50:16:40:62 > Fingerprint (MD5): > F0:A3:A6:44:C8:7D:99:33:63:D9:85:60:15:4A:9E:E7 > Fingerprint (SHA1): > 89:B1:48:FF:A9:8E:D9:59:EA:84:C7:DD:8D:8A:71:EA:EC:53:63:FC > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #2471: CRL Distribution Points Extension (8) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args >certutil options: >0 >1 >2 >10 >n >Generating key. This may take a few moments... > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt9 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:54:0c > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View > ,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:17:05 2013 > Not After : Fri Jun 07 00:17:05 2013 > Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie > w,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b3:48:8a:35:f2:3e:a2:4f:ff:23:9a:3e:c3:eb:01:12: > 1f:2f:cb:74:00:82:46:b9:b9:d2:59:66:ef:ef:07:7f: > 57:af:83:b6:e5:49:dc:e6:7e:47:9e:e0:27:33:14:21: > 25:03:8e:f8:5d:9f:ce:ac:46:93:48:80:e5:83:16:28: > 16:f6:6c:b5:eb:3e:d6:29:a4:85:d3:38:5c:2d:be:94: > e5:55:65:4c:df:c1:42:17:62:bd:13:27:34:53:15:3a: > ed:6e:9d:62:57:87:ec:09:94:16:d0:13:b7:5a:ae:62: > 75:6d:a6:60:71:a0:c3:80:c5:e6:84:b0:78:ed:83:9b > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL Client,SSL Server,S/MIME> > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 7d:e9:97:0d:c6:13:27:30:39:b6:70:07:b9:c8:27:cf: > 59:ee:e3:90:95:b4:9c:e0:12:68:ea:60:9f:37:2d:3a: > 5a:b5:00:45:e9:55:28:b2:fa:07:01:14:cc:e6:4e:07: > b0:f3:ab:51:a6:ff:ec:a3:14:5a:f9:2d:0a:78:bb:70: > ce:6b:62:18:12:22:02:4a:01:f2:19:c7:80:8f:85:5c: > 01:f2:1e:ba:74:41:02:61:6e:53:6d:fb:da:27:70:cd: > e2:b5:fe:86:96:4a:02:f6:90:e1:0a:09:50:91:99:b0: > 9b:ab:f2:bb:55:35:4f:ce:f3:30:02:01:d8:0e:f6:77 > Fingerprint (MD5): > 0A:2B:EE:5F:5E:6D:6D:81:26:6E:C8:45:3A:B2:D1:01 > Fingerprint (SHA1): > E2:E3:7A:46:A1:20:27:93:94:79:74:72:B3:79:30:5F:08:3E:C1:F8 > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #2472: Certificate Type Extension (9) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args >certutil options: >0 >1 >2 >3 >4 >5 >6 >10 >y >Generating key. This may take a few moments... > 0 - Server Auth > 1 - Client Auth > 2 - Code Signing > 3 - Email Protection > 4 - Timestamp > 5 - OCSP Responder > 6 - Step-up > 7 - Microsoft Trust List Signing > Other to finish > > 0 - Server Auth > 1 - Client Auth > 2 - Code Signing > 3 - Email Protection > 4 - Timestamp > 5 - OCSP Responder > 6 - Step-up > 7 - Microsoft Trust List Signing > Other to finish > > 0 - Server Auth > 1 - Client Auth > 2 - Code Signing > 3 - Email Protection > 4 - Timestamp > 5 - OCSP Responder > 6 - Step-up > 7 - Microsoft Trust List Signing > Other to finish > > 0 - Server Auth > 1 - Client Auth > 2 - Code Signing > 3 - Email Protection > 4 - Timestamp > 5 - OCSP Responder > 6 - Step-up > 7 - Microsoft Trust List Signing > Other to finish > > 0 - Server Auth > 1 - Client Auth > 2 - Code Signing > 3 - Email Protection > 4 - Timestamp > 5 - OCSP Responder > 6 - Step-up > 7 - Microsoft Trust List Signing > Other to finish > > 0 - Server Auth > 1 - Client Auth > 2 - Code Signing > 3 - Email Protection > 4 - Timestamp > 5 - OCSP Responder > 6 - Step-up > 7 - Microsoft Trust List Signing > Other to finish > > 0 - Server Auth > 1 - Client Auth > 2 - Code Signing > 3 - Email Protection > 4 - Timestamp > 5 - OCSP Responder > 6 - Step-up > 7 - Microsoft Trust List Signing > Other to finish > > 0 - Server Auth > 1 - Client Auth > 2 - Code Signing > 3 - Email Protection > 4 - Timestamp > 5 - OCSP Responder > 6 - Step-up > 7 - Microsoft Trust List Signing > Other to finish > > Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt10 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:54:0c > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi > ew,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:17:05 2013 > Not After : Fri Jun 07 00:17:05 2013 > Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V > iew,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b2:48:89:63:45:ab:ef:b3:79:b4:33:0c:93:5d:0d:ff: > 08:b2:1d:3a:fc:66:12:9b:d8:44:65:cb:1b:e9:05:83: > 68:f0:19:11:2f:9a:43:96:68:72:fb:a2:74:d7:ba:e4: > 52:b4:6b:ce:55:71:0d:e0:8e:68:7f:e3:c0:5a:7b:57: > dc:42:3e:ad:a3:e9:e6:2a:a8:03:66:78:6b:f4:4f:26: > 20:87:50:9c:e0:78:8d:5c:b7:4e:e2:d7:c8:fa:c9:5e: > 3d:d3:6d:6d:87:18:bd:10:9e:0a:c9:df:a6:c0:a2:c8: > 22:8c:c5:e4:83:a6:6b:c5:f9:97:de:50:3a:f7:96:77 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Extended Key Usage > Critical: True > TLS Web Server Authentication Certificate > TLS Web Client Authentication Certificate > Code Signing Certificate > E-Mail Protection Certificate > Time Stamping Certifcate > OCSP Responder Certificate > Strong Crypto Export Approved > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 21:3a:ac:b9:95:f7:7e:59:fa:c7:62:88:be:fe:80:85: > a2:16:16:66:2a:de:b1:51:09:7e:5e:b6:72:d4:89:7a: > a5:e7:5c:21:12:12:80:43:2e:30:05:2c:66:84:55:fa: > e9:b0:06:d2:bf:39:af:98:8c:fd:4f:06:90:ae:be:81: > cf:e1:81:23:1a:5c:e8:cd:d3:13:84:f7:bc:f6:82:15: > a5:ea:6c:bf:5c:fb:a2:78:c8:99:dd:d9:53:19:08:99: > 43:a0:15:1e:88:e4:cb:48:cf:ec:13:88:85:d2:62:27: > c8:e0:14:bf:73:3d:3b:4f:01:59:7b:cf:8f:13:94:3b > Fingerprint (MD5): > 48:23:F7:DC:FC:53:BE:D0:DF:09:91:B9:17:36:7C:5C > Fingerprint (SHA1): > A4:51:F0:4C:E6:B8:71:9B:85:7C:39:71:CF:6A:03:E9:A4:99:C2:11 > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #2473: Extended Key Usage Extension (10) - PASSED >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args >certutil options: >1 >2 >3 >4 >5 >6 >10 >n >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >certutil -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt11 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 00:9a:e9:54:0d > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi > ew,ST=California,C=US" > Validity: > Not Before: Thu Mar 07 00:17:05 2013 > Not After : Fri Jun 07 00:17:05 2013 > Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V > iew,ST=California,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d3:bf:7a:4f:c9:16:a0:16:72:aa:2e:1d:4b:c6:ef:e4: > 31:5a:45:2f:38:84:8a:db:fa:08:ef:c0:82:2e:fe:00: > cc:94:1c:62:d8:5f:60:ac:9a:b8:57:98:1d:ff:4a:b0: > 65:c3:93:cc:5a:da:a6:c2:ee:02:db:ae:84:12:7e:a0: > aa:fd:b0:78:33:08:5e:62:ef:c4:7d:4b:0a:d0:64:4b: > 62:bc:d8:b6:1c:cd:b9:72:9e:3e:ff:6a:e3:3e:e5:ed: > 97:89:b1:3c:3f:fc:b9:1d:6a:5d:8f:6d:43:37:79:0d: > 03:dd:59:5b:9e:9f:02:5a:ea:a7:2b:a3:bb:dc:54:bf > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Key Usage > Usages: Non-Repudiation > Key Encipherment > Data Encipherment > Key Agreement > Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > c0:31:be:92:0f:4a:e7:29:4f:03:57:c0:28:99:f1:76: > 47:2f:ee:ce:9d:ae:f5:30:6f:e5:55:c6:37:a4:40:e2: > b4:e3:5d:51:35:df:45:e6:fa:ce:19:8f:38:27:2f:b6: > 12:71:8c:ab:84:5c:38:00:77:75:10:57:3c:65:fc:ef: > 58:7d:52:27:a8:d0:4c:2d:8b:20:65:bd:01:79:d4:25: > 33:e6:af:f7:7e:57:b1:69:b8:ce:da:2d:7d:aa:7d:6a: > 61:f3:63:c8:ad:38:19:47:c7:e9:b8:b1:cd:6a:9d:18: > 2b:64:2e:51:6d:b5:35:6c:2e:6e:c0:d4:ac:de:29:c6 > Fingerprint (MD5): > 51:92:EE:92:D1:2C:7B:CD:33:FC:3B:09:6F:B9:CB:49 > Fingerprint (SHA1): > 33:6A:57:45:7A:84:54:76:55:C4:5F:84:08:FF:A3:91:02:31:E3:EF > Certificate Trust Flags: > SSL Flags: > User > Email Flags: > User > Object Signing Flags: > User >cert.sh: #2474: Certificate Key Usage Extension (11) - PASSED >cert.sh: Create A Password Test Cert ============== >cert.sh: Create A Password Test Ca -------- >cert.sh: Creating a CA Certificate PasswordCA ========================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/dbpass >cert.sh: Creating CA Cert DB -------------------------- >certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw >cert.sh: #2475: Creating CA Cert DB - PASSED >cert.sh: Loading root cert module to CA Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/dbpass >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #2476: Loading root cert module to CA Cert DB - PASSED >cert.sh: Certificate initialized ---------- >cert.sh: Creating CA Cert PasswordCA -------------------------- >certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >cert.sh: #2477: Creating CA Cert PasswordCA - PASSED >cert.sh: Exporting Root Cert -------------------------- >certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/dbpass -o root.cert >cert.sh: #2478: Exporting Root Cert - PASSED >cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- >certutil -W -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw -@ ../tests.fipspw >Password changed successfully. >cert.sh: #2479: Changing password on Password Test Cert's Cert DB - PASSED >cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- >certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw -z ../tests_noise >Generating key. This may take a few moments... >cert.sh: #2480: Generate Certificate for Password Test Cert with new password - PASSED >cert.sh SUCCESS: PASSWORD passed >cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- >certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw >certutil: certificate is valid >cert.sh: #2481: Verify Certificate for Password Test Cert with new password - PASSED >cert.sh: Creating Distrusted Certificate >cert.sh: Initializing Distrusted's Cert DB -------------------------- >certutil -N -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw >cert.sh: #2482: Initializing Distrusted's Cert DB - PASSED >cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- >modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit browser before continuing this operation. Type >'q <enter>' to abort, or <enter> to continue: >Module "RootCerts" added to database. >cert.sh: #2483: Loading root cert module to Distrusted's Cert DB - PASSED >cert.sh: Import Root CA for Distrusted -------------------------- >certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA.ca.cert >cert.sh: #2484: Import Root CA for Distrusted - PASSED >cert.sh: Generate Cert Request for Distrusted -------------------------- >certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2485: Generate Cert Request for Distrusted - PASSED >cert.sh: Sign Distrusted's Request -------------------------- >certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw >cert.sh: #2486: Sign Distrusted's Request - PASSED >cert.sh: Import Distrusted's Cert -------------------------- >certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted.cert >cert.sh: #2487: Import Distrusted's Cert - PASSED >cert.sh SUCCESS: Distrusted's Cert Created >cert.sh: Mark CERT as unstrusted -------------------------- >certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw >cert.sh: #2488: Mark CERT as unstrusted - PASSED >cert.sh: Creating Distrusted Intermediate >cert.sh: Creating a CA Certificate DistrustedCA ========================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/CA >cert.sh: Creating CA Cert DistrustedCA -------------------------- >certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >cert.sh: #2489: Creating CA Cert DistrustedCA - PASSED >cert.sh: Exporting Root Cert -------------------------- >certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/CA -o root.cert >cert.sh: #2490: Exporting Root Cert - PASSED >cert.sh: Import Distrusted Intermediate -------------------------- >certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -i ../CA/DistrustedCA.ca.cert >cert.sh: #2491: Import Distrusted Intermediate - PASSED >cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- >certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2492: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED >cp: './req' and '/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/CA/req' are the same file >cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- >certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw >cert.sh: #2493: Sign LeafChainedToDistrustedCA's Request - PASSED >cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- >certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert >cert.sh: #2494: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED >cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- >certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw >certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. >cert.sh: #2495: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED >cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- >certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw >certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. >cert.sh: #2496: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED >cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- >certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw >certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. >cert.sh: #2497: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED >cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- >certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw >certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. >cert.sh: #2498: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED >cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- >certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw >certutil: certificate is invalid: Certificate type not approved for application. >cert.sh: #2499: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED >cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- >certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw >certutil: certificate is invalid: Certificate type not approved for application. >cert.sh: #2500: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED >cert.sh: Verify Distrusted Cert for SSL Server -------------------------- >certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw >certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. >cert.sh: #2501: Verify Distrusted Cert for SSL Server - PASSED >cert.sh: Verify Distrusted Cert for SSL Client -------------------------- >certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw >certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. >cert.sh: #2502: Verify Distrusted Cert for SSL Client - PASSED >cert.sh: Verify Distrusted Cert for Email signer -------------------------- >certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw >certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. >cert.sh: #2503: Verify Distrusted Cert for Email signer - PASSED >cert.sh: Verify Distrusted Cert for Email recipient -------------------------- >certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw >certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. >cert.sh: #2504: Verify Distrusted Cert for Email recipient - PASSED >cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- >certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw >certutil: certificate is invalid: Certificate type not approved for application. >cert.sh: #2505: Verify Distrusted Cert for OCSP responder - PASSED >cert.sh: Verify Distrusted Cert for Object Signer -------------------------- >certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw >certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. >cert.sh: #2506: Verify Distrusted Cert for Object Signer - PASSED >cert.sh: OCSP response creation selftest >cert.sh: perform selftest -------------------------- >ocspresp /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/serverCA serverCA chain-1-serverCA -f ../tests.pw >cert.sh: #2507: perform selftest - PASSED >cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === >cert.sh: Generate Cert Request for TestUser40 -------------------------- >certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2508: Generate Cert Request for TestUser40 - PASSED >cert.sh: Sign TestUser40's Request -------------------------- >certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw >cert.sh: #2509: Sign TestUser40's Request - PASSED >cert.sh: Import TestUser40's Cert -------------------------- >certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40.cert >cert.sh: #2510: Import TestUser40's Cert - PASSED >cert.sh SUCCESS: TestUser40's Cert Created >cert.sh: Generate Cert Request for TestUser41 -------------------------- >certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2511: Generate Cert Request for TestUser41 - PASSED >cert.sh: Sign TestUser41's Request -------------------------- >certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw >cert.sh: #2512: Sign TestUser41's Request - PASSED >cert.sh: Import TestUser41's Cert -------------------------- >certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41.cert >cert.sh: #2513: Import TestUser41's Cert - PASSED >cert.sh SUCCESS: TestUser41's Cert Created >cert.sh: Generate Cert Request for TestUser42 -------------------------- >certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2514: Generate Cert Request for TestUser42 - PASSED >cert.sh: Sign TestUser42's Request -------------------------- >certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw >cert.sh: #2515: Sign TestUser42's Request - PASSED >cert.sh: Import TestUser42's Cert -------------------------- >certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42.cert >cert.sh: #2516: Import TestUser42's Cert - PASSED >cert.sh SUCCESS: TestUser42's Cert Created >cert.sh: Generate Cert Request for TestUser43 -------------------------- >certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2517: Generate Cert Request for TestUser43 - PASSED >cert.sh: Sign TestUser43's Request -------------------------- >certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw >cert.sh: #2518: Sign TestUser43's Request - PASSED >cert.sh: Import TestUser43's Cert -------------------------- >certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43.cert >cert.sh: #2519: Import TestUser43's Cert - PASSED >cert.sh SUCCESS: TestUser43's Cert Created >cert.sh: Generate Cert Request for TestUser44 -------------------------- >certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2520: Generate Cert Request for TestUser44 - PASSED >cert.sh: Sign TestUser44's Request -------------------------- >certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw >cert.sh: #2521: Sign TestUser44's Request - PASSED >cert.sh: Import TestUser44's Cert -------------------------- >certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44.cert >cert.sh: #2522: Import TestUser44's Cert - PASSED >cert.sh SUCCESS: TestUser44's Cert Created >cert.sh: Generate Cert Request for TestUser45 -------------------------- >certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2523: Generate Cert Request for TestUser45 - PASSED >cert.sh: Sign TestUser45's Request -------------------------- >certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw >cert.sh: #2524: Sign TestUser45's Request - PASSED >cert.sh: Import TestUser45's Cert -------------------------- >certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45.cert >cert.sh: #2525: Import TestUser45's Cert - PASSED >cert.sh SUCCESS: TestUser45's Cert Created >cert.sh: Generate Cert Request for TestUser46 -------------------------- >certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2526: Generate Cert Request for TestUser46 - PASSED >cert.sh: Sign TestUser46's Request -------------------------- >certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw >cert.sh: #2527: Sign TestUser46's Request - PASSED >cert.sh: Import TestUser46's Cert -------------------------- >certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46.cert >cert.sh: #2528: Import TestUser46's Cert - PASSED >cert.sh SUCCESS: TestUser46's Cert Created >cert.sh: Generate Cert Request for TestUser47 -------------------------- >certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2529: Generate Cert Request for TestUser47 - PASSED >cert.sh: Sign TestUser47's Request -------------------------- >certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw >cert.sh: #2530: Sign TestUser47's Request - PASSED >cert.sh: Import TestUser47's Cert -------------------------- >certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47.cert >cert.sh: #2531: Import TestUser47's Cert - PASSED >cert.sh SUCCESS: TestUser47's Cert Created >cert.sh: Generate Cert Request for TestUser48 -------------------------- >certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2532: Generate Cert Request for TestUser48 - PASSED >cert.sh: Sign TestUser48's Request -------------------------- >certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw >cert.sh: #2533: Sign TestUser48's Request - PASSED >cert.sh: Import TestUser48's Cert -------------------------- >certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48.cert >cert.sh: #2534: Import TestUser48's Cert - PASSED >cert.sh SUCCESS: TestUser48's Cert Created >cert.sh: Generate Cert Request for TestUser49 -------------------------- >certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2535: Generate Cert Request for TestUser49 - PASSED >cert.sh: Sign TestUser49's Request -------------------------- >certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw >cert.sh: #2536: Sign TestUser49's Request - PASSED >cert.sh: Import TestUser49's Cert -------------------------- >certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49.cert >cert.sh: #2537: Import TestUser49's Cert - PASSED >cert.sh SUCCESS: TestUser49's Cert Created >cert.sh: Generate Cert Request for TestUser50 -------------------------- >certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2538: Generate Cert Request for TestUser50 - PASSED >cert.sh: Sign TestUser50's Request -------------------------- >certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw >cert.sh: #2539: Sign TestUser50's Request - PASSED >cert.sh: Import TestUser50's Cert -------------------------- >certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50.cert >cert.sh: #2540: Import TestUser50's Cert - PASSED >cert.sh SUCCESS: TestUser50's Cert Created >cert.sh: Generate Cert Request for TestUser51 -------------------------- >certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2541: Generate Cert Request for TestUser51 - PASSED >cert.sh: Sign TestUser51's Request -------------------------- >certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw >cert.sh: #2542: Sign TestUser51's Request - PASSED >cert.sh: Import TestUser51's Cert -------------------------- >certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51.cert >cert.sh: #2543: Import TestUser51's Cert - PASSED >cert.sh SUCCESS: TestUser51's Cert Created >cert.sh: Generate Cert Request for TestUser52 -------------------------- >certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req >Generating key. This may take a few moments... >cert.sh: #2544: Generate Cert Request for TestUser52 - PASSED >cert.sh: Sign TestUser52's Request -------------------------- >certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw >cert.sh: #2545: Sign TestUser52's Request - PASSED >cert.sh: Import TestUser52's Cert -------------------------- >certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52.cert >cert.sh: #2546: Import TestUser52's Cert - PASSED >cert.sh SUCCESS: TestUser52's Cert Created >cert.sh: Creating CA CRL ===================================== >cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- >crlutil -q -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or >cert.sh: #2547: Generating CRL for range 40-42 TestCA authority - PASSED >cert.sh: Modifying CA CRL by adding one more cert ============ >cert.sh: Modify CRL by adding one more cert -------------------------- >crlutil -q -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or >cert.sh: #2548: Modify CRL by adding one more cert - PASSED >cert.sh: Modifying CA CRL by removing one cert =============== >cert.sh: Modify CRL by removing one cert -------------------------- >crlutil -q -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 >cert.sh: #2549: Modify CRL by removing one cert - PASSED >cert.sh: Creating CA CRL for groups 1 and 2 =============== >cert.sh: Creating CRL for groups 1 and 2 -------------------------- >crlutil -q -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 >cert.sh: #2550: Creating CRL for groups 1 and 2 - PASSED >cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== >cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- >crlutil -q -d /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 >cert.sh: #2551: Creating CRL for groups 1, 2 and 3 - PASSED >cert.sh: Importing Server CA Issued CRL for certs trough 52 >cert.sh: Importing CRL for groups 1 -------------------------- >crlutil -q -D -n TestCA -f ../tests.pw -d ../server >crlutil: could not find TestCA's CRL: No matching CRL was found. >crlutil: could not find the issuer TestCA's CRL: No matching CRL was found. >cert.sh: #2552: Importing CRL for groups 1 - PASSED >cert.sh: Importing CRL for groups 1 -------------------------- >crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server >cert.sh: #2553: Importing CRL for groups 1 - PASSED >cert.sh SUCCESS: SSL CRL prep passed >cert.sh cert.sh: finished cert.sh >TIMESTAMP cert END: Wed Mar 6 17:17:17 MST 2013 >Running tests for tools >TIMESTAMP tools BEGIN: Wed Mar 6 17:17:17 MST 2013 >tools.sh: Tools Tests =============================== >tools.sh: Exporting Alice's email cert & key - default ciphers >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2554: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 0d:fd:59:a4:9e:f2:4d:8e:cc:49:d5:23:8b:bd:c0:78 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2555: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2556: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2557: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC > Parameters: > Salt: > c8:e1:4a:cf:f1:a1:c6:97:72:df:5c:a1:12:71:ee:51 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2558: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2559: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2560: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC > Parameters: > Salt: > 01:c8:d3:f7:94:2b:cc:67:96:bb:df:ed:9b:1e:f9:f1 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2561: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2562: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2563: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC > Parameters: > Salt: > 67:ff:f0:4c:84:cf:cb:90:37:ee:01:46:08:c3:e4:90 > Iteration Count: 2000 (0x7d0) >tools.sh: #2564: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2565: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2566: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 79:f6:13:04:09:48:23:30:42:5b:11:a9:bf:64:4e:d1 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2567: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2568: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2569: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 46:ab:c9:ab:1c:de:a1:26:3f:78:dd:37:2e:96:ea:1d > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2570: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2571: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2572: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > d1:c2:ad:10:d2:fe:19:34:ab:64:5a:12:ef:60:1f:d7 > Iteration Count: 2000 (0x7d0) >tools.sh: #2573: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2574: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2575: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > a5:8f:f6:dd:7d:6d:9b:af:ef:44:6a:93:48:47:b1:d0 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-128-CBC > Args: > 04:10:7f:c0:3f:7b:98:47:66:f5:0e:1e:6e:04:4d:0b: > ee:c5 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2576: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2577: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2578: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 11:29:1b:ce:f9:40:d6:97:1b:60:27:3a:cf:21:a0:9f > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-128-CBC > Args: > 04:10:84:4f:1e:49:8f:06:9e:92:17:b5:9d:f8:83:fe: > 24:24 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2579: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2580: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2581: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 2a:29:3e:7b:b3:da:d9:6f:12:96:4a:2c:42:e2:94:0d > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-128-CBC > Args: > 04:10:48:70:d7:3e:8f:c4:9e:ff:49:85:ab:e4:b0:6d: > 64:3b >tools.sh: #2582: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2583: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2584: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > ab:76:70:9d:f5:f1:7f:ac:e5:da:70:f8:f8:15:4a:45 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-192-CBC > Args: > 04:10:76:37:d6:40:d5:9a:a8:23:08:cf:9f:b7:1d:59: > 7c:ed >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2585: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2586: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2587: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > f6:fe:59:9c:c2:9f:fa:81:d6:11:c5:dd:7c:e7:8a:91 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-192-CBC > Args: > 04:10:4b:c0:b6:63:ac:d5:c7:d7:ef:4b:c2:13:d7:4e: > 93:01 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2588: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2589: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2590: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > e1:0f:67:91:d4:bb:86:25:64:f1:04:de:5d:46:7c:bf > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-192-CBC > Args: > 04:10:f6:90:78:be:14:00:9a:54:29:89:05:61:7b:d5: > eb:3c >tools.sh: #2591: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2592: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2593: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 4f:3e:91:d2:44:75:db:38:16:b3:f6:1d:c1:24:77:57 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-256-CBC > Args: > 04:10:e8:7a:e0:9e:cf:3d:e2:47:e8:fb:7a:c6:90:ec: > c1:67 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2594: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2595: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2596: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > df:7e:c9:f8:fd:01:ec:a8:c0:45:d2:7d:17:41:73:2c > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-256-CBC > Args: > 04:10:03:12:4a:2a:2b:1e:07:68:6d:6b:fc:13:ac:8a: > 7c:b5 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2597: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2598: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2599: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 10:ee:df:50:65:6d:10:f7:fa:7e:61:6e:bb:be:a3:d4 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-256-CBC > Args: > 04:10:42:86:28:48:90:50:40:63:34:54:82:e2:da:3f: > 53:58 >tools.sh: #2600: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2601: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2602: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 12:f2:b8:56:a4:8d:fe:c7:62:bf:ff:f1:2c:c5:12:ad > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-128-CBC > Args: > 04:10:b8:87:2e:96:be:d7:46:40:70:68:81:c8:b4:64: > cd:db >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2603: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2604: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2605: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 82:86:71:0f:55:d6:e4:7a:c2:8a:1f:63:42:5c:d1:6f > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-128-CBC > Args: > 04:10:23:c8:ff:43:1c:f2:15:81:de:6c:a0:f2:44:eb: > d7:25 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2606: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2607: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2608: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 9e:e2:5b:f4:83:7c:42:75:02:51:4f:55:17:06:48:ce > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-128-CBC > Args: > 04:10:96:17:4c:28:8f:4f:9b:2a:4b:f8:82:2f:85:e3: > fe:3c >tools.sh: #2609: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2610: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2611: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 52:a8:3c:b5:e4:34:84:fc:33:ca:83:df:11:e9:50:ba > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-192-CBC > Args: > 04:10:65:c1:c6:2f:52:79:aa:0d:f3:6d:da:1e:24:df: > 0b:4e >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2612: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2613: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2614: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 4d:7e:fe:84:f3:ef:04:80:5a:be:20:4d:86:4a:62:a4 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-192-CBC > Args: > 04:10:8f:ed:99:a3:d0:b7:37:cd:b7:21:c5:45:9a:60: > a2:0f >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2615: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2616: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2617: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > fb:b1:d2:d3:13:e1:6e:80:48:a5:53:e8:11:a1:af:8e > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-192-CBC > Args: > 04:10:d9:fd:e3:42:07:f1:d6:7b:f2:40:9b:6a:5e:fa: > b5:5c >tools.sh: #2618: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2619: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2620: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 71:74:9a:cd:16:e6:07:ec:b0:8e:59:f2:5d:46:2d:b9 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-256-CBC > Args: > 04:10:d6:fe:b1:97:f2:e6:35:08:4e:06:0c:c0:b7:76: > 8a:ac >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2621: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2622: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2623: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 38:68:ef:fe:74:b9:09:0a:c3:6b:b5:e4:3d:04:33:37 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-256-CBC > Args: > 04:10:2f:ba:bd:a7:54:ff:67:89:bf:58:d9:24:9c:0f: > 34:4d >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2624: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2625: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2626: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > f9:b1:87:52:5c:86:27:59:77:b2:24:d6:ef:6e:63:99 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-256-CBC > Args: > 04:10:45:ad:2e:24:6f:17:7a:87:fd:10:a0:67:46:62: > f3:d5 >tools.sh: #2627: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2628: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2629: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC > Parameters: > Salt: > 6d:c2:65:af:30:40:4c:ec:3c:4a:96:84:d5:e2:2d:10 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2630: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2631: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2632: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC > Parameters: > Salt: > b1:dd:7d:21:6e:2a:9b:c3:60:f2:4e:95:e6:dc:5e:19 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2633: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2634: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2635: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC > Parameters: > Salt: > b7:53:e8:9e:bf:04:0b:65:29:a2:92:de:10:1e:4f:5e > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2636: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2637: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2638: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC > Parameters: > Salt: > 2c:b0:06:15:1b:5e:b8:71:1c:41:b0:e8:68:b7:14:82 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2639: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2640: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2641: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC > Parameters: > Salt: > 00:66:87:91:85:bb:53:bd:72:c8:ca:70:2e:3a:86:34 > Iteration Count: 2000 (0x7d0) >tools.sh: #2642: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2643: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2644: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC > Parameters: > Salt: > 72:a7:bd:4e:ed:f6:77:bf:c3:fb:58:12:7f:6f:b0:2a > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2645: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2646: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2647: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC > Parameters: > Salt: > 70:bf:3f:44:65:10:a1:bd:02:9e:0e:9f:ee:bb:90:3a > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2648: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2649: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2650: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC > Parameters: > Salt: > 6f:55:ed:b5:ae:ac:09:cf:44:7e:1a:68:e3:c5:5d:93 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2651: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2652: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2653: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC > Parameters: > Salt: > 17:b3:9f:7b:2b:dc:44:4d:7a:9d:07:05:34:4c:0d:6a > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2654: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2655: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2656: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC > Parameters: > Salt: > 9d:51:e5:9c:50:d2:14:1e:e2:87:b4:89:e4:2c:34:33 > Iteration Count: 2000 (0x7d0) >tools.sh: #2657: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2658: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2659: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC > Parameters: > Salt: > 16:66:91:7c:3b:a5:8f:e3:68:b8:25:86:5a:f7:bf:14 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2660: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2661: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2662: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC > Parameters: > Salt: > 8f:07:dd:ca:33:b7:5c:3a:bd:a1:c7:1f:58:57:5a:08 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2663: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2664: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2665: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC > Parameters: > Salt: > 33:23:f3:7d:6d:eb:77:58:16:cf:ae:68:f5:fc:84:7b > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2666: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2667: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2668: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC > Parameters: > Salt: > db:c1:5e:20:4d:7f:09:ff:5d:2d:6e:e1:91:41:9a:2c > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2669: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2670: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2671: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC > Parameters: > Salt: > b5:7d:2b:88:b3:89:c5:d4:2e:98:29:5b:0d:b8:ae:db > Iteration Count: 2000 (0x7d0) >tools.sh: #2672: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2673: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2674: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 2f:40:53:62:b3:06:15:bf:8f:91:de:df:99:18:49:8e > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2675: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2676: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2677: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 1a:00:de:30:a6:b5:df:7f:42:ad:8a:39:e8:7a:07:15 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2678: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2679: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2680: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 26:a7:6a:70:76:27:9b:4c:fa:53:21:72:44:2b:a6:60 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2681: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2682: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2683: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 4a:98:c0:95:d0:ad:15:71:1e:96:69:e6:e0:67:d9:15 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2684: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2685: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [default:null] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2686: Exporting with [default:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 83:53:03:dc:6b:88:a5:9b:29:64:41:f3:22:7a:ba:8c > Iteration Count: 2000 (0x7d0) >tools.sh: #2687: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2688: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2689: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 35:b6:3a:e0:16:63:c0:c8:a9:f7:41:ab:1e:9b:1e:b1 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2690: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2691: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2692: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 73:56:d1:dd:96:eb:63:43:b4:db:f1:b7:f2:2d:ac:07 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2693: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2694: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2695: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 46:13:b8:37:a6:37:1d:76:fe:b1:f6:e7:ad:33:39:b6 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2696: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2697: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2698: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > f5:08:cb:7d:62:7e:09:7b:bc:b9:c4:6f:d2:af:f8:44 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2699: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2700: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2701: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > a8:e6:df:58:ae:3d:85:b5:cb:29:b8:23:8d:de:32:d0 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2702: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2703: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2704: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > d9:37:82:e2:31:11:b0:70:1f:b8:63:65:12:79:b3:31 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2705: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2706: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2707: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > c7:73:53:b5:cd:5d:4e:0e:fd:2d:c7:f4:bb:ea:cd:a0 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2708: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2709: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2710: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > b5:f2:54:88:80:0f:97:91:db:bf:c1:62:5a:9c:8f:30 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2711: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2712: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2713: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 4a:72:6c:d8:6b:f8:27:eb:a7:88:19:4f:b5:f6:f2:58 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2714: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2715: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2716: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 09:fe:0b:94:a0:a5:51:6c:eb:a7:db:e1:bb:d5:45:fe > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:16:58 2013 > Not After : Wed Mar 07 00:16:58 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:38:cb:ba:19:dd:c4:a4:b6:42:34:2b:b8:01:87:f8: > 30:fa:dd:be:36:bb:d8:94:c6:23:fd:ae:e8:3c:59:46: > 6e:dc:87:f4:5e:94:0d:5f:05:59:1e:75:4d:ec:b6:ca: > 77:bc:8a:ea:e8:90:aa:ba:d9:28:98:c2:8e:6d:de:55: > 61:66:d6:15:50:56:ad:96:35:ba:57:3f:66:f9:d7:6e: > 85:07:ff:5a:c9:a6:98:74:e0:9c:5d:01:63:39:8a:03: > 82:2c:f3:00:87:89:a8:17:13:02:e4:76:df:e3:e6:88: > 46:02:6a:cc:58:17:6b:7e:71:21:78:77:ac:f0:c3:61 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 30:43:14:87:24:b5:7f:74:08:bd:08:56:3a:ce:d7:82: > 0f:24:1c:da:a5:a0:81:cb:f1:bc:a3:8f:86:af:76:3e: > e3:56:aa:e6:2f:3f:69:9c:73:99:9b:f7:bb:e4:ee:0a: > 7b:1d:a3:c7:44:38:32:9d:9b:b2:ab:1e:c8:ee:1d:71: > 4f:27:86:c7:d3:93:de:46:c6:72:5d:e1:97:88:84:03: > fc:79:86:e0:6f:c4:90:20:00:48:28:a2:a7:5a:99:11: > c9:80:38:96:ec:85:1c:d8:8c:e3:f5:3b:74:35:35:6d: > 40:e8:15:ec:03:2a:c9:f8:7c:49:f5:f1:42:33:7a:c4 > Fingerprint (MD5): > 16:26:02:81:CE:D2:5C:AE:72:09:79:C6:37:F6:0B:1F > Fingerprint (SHA1): > 85:1B:9A:53:42:AF:36:CE:A6:0E:CD:51:13:FA:B7:E2:87:0B:B8:66 > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:17:01 2013 > Not After : Wed Mar 07 00:17:01 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:44:85:6c:02:c2:ea:b6:c7:6f:0a:7d:19:2d:7d:7a: > a7:7e:23:4b:05:45:e2:44:ca:68:69:30:92:bb:69:6d: > a5:64:16:c5:cc:44:c6:b7:5c:98:e8:20:5f:c6:3c:8b: > e0:66:72:56:7c:ab:a4:b7:62:0e:a6:1f:64:bf:0a:91: > 89:0a:60:6f:80:f6:52:54:45:ab:f8:84:0f:4e:df:77: > 6a:b7:1b:42:b7:69:1a:6e:e1:08:d3:e8:e0:5b:6b:8c: > 7a:0a:62:83:9b:15:4b:77:38:5f:28:93:92:7b:7e:b6: > a5:b0:e9:6b:ac:11:bd:27:91:ce:00:f6:9f:b4:9f:b3 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2c:1a:03:f4:bd:fa:18:0b:f0:94:7b:bd:43:ae:39:ee: > 77:c7:9e:71:b2:0e:cc:8d:6e:c9:b3:e2:48:40:1e:f2: > d9:f5:e9:42:3c:63:f8:6f:06:76:56:b5:73:50:69:21: > 7d:e6:54:d1:b3:56:98:1e:7b:fa:c1:3b:81:a4:e8:34: > 1f:f5:7f:7b:68:5e:bf:de:9f:ad:2c:c4:e8:8e:8f:b6: > 8e:fb:14:e4:74:76:4d:e5:67:7e:34:6e:36:2d:65:9d: > 25:dc:89:9f:74:c0:5d:eb:be:b9:0e:f5:a6:7c:98:12: > 8b:ae:dd:24:78:1f:81:d2:28:1b:e1:3a:24:f3:6f:91 > Fingerprint (MD5): > 17:A3:7A:6E:05:0D:CE:C9:9F:26:AD:87:CC:59:DC:D1 > Fingerprint (SHA1): > 02:9D:4F:F5:6E:43:6E:96:2A:EC:7E:22:6A:E8:3E:06:46:6E:0D:BE > Friendly Name: Alice >tools.sh: #2717: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #2718: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c null >pk12util: Algorithm: "null": security library: invalid algorithm. >tools.sh: #2719: Exporting with [null:default] (pk12util -o) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #2720: Exporting with [default:null] (pk12util -o) - PASSED >tools.sh: Create objsign cert ------------------------------- >signtool -G "objectsigner" -d ../tools/signdir -p "nss" >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit the browser before continuing this operation. Enter >"y" to continue, or anything else to abort: >Enter certificate information. All fields are optional. Acceptable >characters are numbers, letters, spaces, and apostrophes. >certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair >certificate request generated >certificate has been signed >certificate "objsigner" added to database >Exported certificate to x509.raw and x509.cacert. >tools.sh: #2721: Create objsign cert (signtool -G) - PASSED >tools.sh: Signing a jar of files ---------------------------- >signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ > ../tools/html >Generating ../tools/html/META-INF/manifest.mf file.. >--> sign.html >adding ../tools/html/sign.html to nojs.jar...(deflated 26%) >--> signjs.html >adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) >Generating zigbert.sf file.. >adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) >adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) >adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) >tree "../tools/html" signed successfully >tools.sh: #2722: Signing a jar of files (signtool -Z) - PASSED >tools.sh: Listing signed files in jar ---------------------- >signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner >archive "nojs.jar" has passed crypto verification. >found a MF master manifest file: META-INF/manifest.mf >found a SF signature manifest file: META-INF/zigbert.sf > md5 digest on global metainfo: match > sha digest on global metainfo: match >found a RSA signature file: META-INF/zigbert.rsa > status path > ------------ ------------------- > verified sign.html > verified signjs.html >tools.sh: #2723: Listing signed files in jar (signtool -v) - PASSED >tools.sh: Show who signed jar ------------------------------ >signtool -w nojs.jar -d ../tools/signdir >Signer information: >nickname: objsigner >subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org >issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org >tools.sh: #2724: Show who signed jar (signtool -w) - PASSED >tools.sh: Signing a xpi of files ---------------------------- >signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ > ../tools/html >Generating ../tools/html/META-INF/manifest.mf file.. >--> sign.html >--> signjs.html >Generating zigbert.sf file.. >Creating XPI Compatible Archive >adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) >--> sign.html >adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) >--> signjs.html >adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) >adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) >adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) >tree "../tools/html" signed successfully >tools.sh: #2725: Signing a xpi of files (signtool -Z -X) - PASSED >tools.sh: Listing signed files in xpi ---------------------- >signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner >archive "nojs.xpi" has passed crypto verification. >found a RSA signature file: META-INF/zigbert.rsa >found a MF master manifest file: META-INF/manifest.mf >found a SF signature manifest file: META-INF/zigbert.sf > md5 digest on global metainfo: match > sha digest on global metainfo: match > status path > ------------ ------------------- > verified sign.html > verified signjs.html >tools.sh: #2726: Listing signed files in xpi (signtool -v) - PASSED >tools.sh: Show who signed xpi ------------------------------ >signtool -w nojs.xpi -d ../tools/signdir >Signer information: >nickname: objsigner >subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org >issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org >tools.sh: #2727: Show who signed xpi (signtool -w) - PASSED >TIMESTAMP tools END: Wed Mar 6 17:17:23 MST 2013 >Running tests for fips >TIMESTAMP fips BEGIN: Wed Mar 6 17:17:23 MST 2013 >fips.sh: FIPS 140 Compliance Tests =============================== >fips.sh: Verify this module is in FIPS mode ----------------- >modutil -dbdir ../fips -list >Listing of PKCS #11 Modules >----------------------------------------------------------- > 1. NSS Internal FIPS PKCS #11 Module > slots: 1 slot attached > status: loaded > slot: NSS FIPS 140-2 User Private Key Services > token: NSS FIPS 140-2 Certificate DB > 2. RootCerts > library name: /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so > slots: 1 slot attached > status: loaded > slot: NSS Builtin Objects > token: Builtin Object Token >----------------------------------------------------------- >FIPS mode enabled. >fips.sh: #2728: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED >fips.sh: List the FIPS module certificates ----------------- >certutil -d ../fips -L >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >FIPS_PUB_140_Test_Certificate Cu,Cu,Cu >fips.sh: #2729: List the FIPS module certificates (certutil -L) . - PASSED >fips.sh: List the FIPS module keys ------------------------- >certutil -d ../fips -K -f ../tests.fipspw >certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" >< 0> dsa bb6e951c1b265e984319560c9845368b076bfe34 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate >fips.sh: #2730: List the FIPS module keys (certutil -K) . - PASSED >fips.sh: Attempt to list FIPS module keys with incorrect password >certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests.fipsbadpw >certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" >Incorrect password/PIN entered. >certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect. >fips.sh: #2731: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED >certutil -K returned 255 >fips.sh: Validate the certificate -------------------------- >certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw >certutil: certificate is valid >fips.sh: #2732: Validate the certificate (certutil -V -e) . - PASSED >fips.sh: Export the certificate and key as a PKCS#12 file -- >pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw >pk12util: PKCS12 EXPORT SUCCESSFUL >fips.sh: #2733: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED >fips.sh: Export the certificate as a DER-encoded file ------ >certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt >fips.sh: #2734: Export the certificate as a DER (certutil -L -r) . - PASSED >fips.sh: List the FIPS module certificates ----------------- >certutil -d ../fips -L >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >FIPS_PUB_140_Test_Certificate Cu,Cu,Cu >fips.sh: #2735: List the FIPS module certificates (certutil -L) . - PASSED >fips.sh: Delete the certificate and key from the FIPS module >certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw >fips.sh: #2736: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED >fips.sh: List the FIPS module certificates ----------------- >certutil -d ../fips -L >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >fips.sh: #2737: List the FIPS module certificates (certutil -L) . - PASSED >fips.sh: List the FIPS module keys. >certutil -d ../fips -K -f ../tests.fipspw >certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" >certutil: no keys found >fips.sh: #2738: List the FIPS module keys (certutil -K) . - PASSED >fips.sh: Import the certificate and key from the PKCS#12 file >pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw >pk12util: PKCS12 IMPORT SUCCESSFUL >fips.sh: #2739: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED >fips.sh: List the FIPS module certificates ----------------- >certutil -d ../fips -L >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >FIPS_PUB_140_Test_Certificate u,u,u >fips.sh: #2740: List the FIPS module certificates (certutil -L) . - PASSED >fips.sh: List the FIPS module keys -------------------------- >certutil -d ../fips -K -f ../tests.fipspw >certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" >< 0> dsa bb6e951c1b265e984319560c9845368b076bfe34 FIPS_PUB_140_Test_Certificate >fips.sh: #2741: List the FIPS module keys (certutil -K) . - PASSED >fips.sh: Delete the certificate from the FIPS module >certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate >fips.sh: #2742: Delete the certificate from the FIPS module (certutil -D) . - PASSED >fips.sh: List the FIPS module certificates ----------------- >certutil -d ../fips -L >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >fips.sh: #2743: List the FIPS module certificates (certutil -L) . - PASSED >fips.sh: Import the certificate and key from the PKCS#12 file >pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw >pk12util: PKCS12 IMPORT SUCCESSFUL >fips.sh: #2744: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED >fips.sh: List the FIPS module certificates ----------------- >certutil -d ../fips -L >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >FIPS_PUB_140_Test_Certificate u,u,u >fips.sh: #2745: List the FIPS module certificates (certutil -L) . - PASSED >fips.sh: List the FIPS module keys -------------------------- >certutil -d ../fips -K -f ../tests.fipspw >certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" >< 0> dsa bb6e951c1b265e984319560c9845368b076bfe34 FIPS_PUB_140_Test_Certificate >fips.sh: #2746: List the FIPS module keys (certutil -K) . - PASSED >fips.sh: Run PK11MODE in FIPSMODE ----------------- >pk11mode -d ../fips -p fips- -f ../tests.fipspw >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >**** Total number of TESTS ran in FIPS MODE is 106. **** >**** ALL TESTS PASSED **** >fips.sh: #2747: Run PK11MODE in FIPS mode (pk11mode) . - PASSED >fips.sh: Run PK11MODE in Non FIPSMODE ----------------- >pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >**** Total number of TESTS ran in NON FIPS MODE is 104. **** >**** ALL TESTS PASSED **** >fips.sh: #2748: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED >mkdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.chk /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssdbm.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssdbm3.chk /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssdbm3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssutil.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.chk /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle >fips.sh: Detect mangled softoken-------------------------- >mangling /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so >mangle -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so -o -8 -b 5 >Changing byte 0x0015dc48 (1432648): from 5f (95) to 7f (127) >LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle dbtest -r -d ../fips >fips.sh: #2749: Init NSS with a corrupted library (dbtest -r) . - PASSED >fips.sh done >TIMESTAMP fips END: Wed Mar 6 17:17:35 MST 2013 >Running tests for ssl >TIMESTAMP ssl BEGIN: Wed Mar 6 17:17:35 MST 2013 >ssl.sh: SSL tests =============================== >ssl.sh: CRL SSL Client Tests =============================== >ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 40031 >/dev/null 2>/dev/null >selfserv_9218 with PID 40031 found at Wed Mar 6 17:17:35 MST 2013 >selfserv_9218 with PID 40031 started at Wed Mar 6 17:17:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2750: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 40031 at Wed Mar 6 17:17:35 MST 2013 >kill -USR1 40031 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 40031 killed at Wed Mar 6 17:17:35 MST 2013 >ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 40087 >/dev/null 2>/dev/null >selfserv_9218 with PID 40087 found at Wed Mar 6 17:17:35 MST 2013 >selfserv_9218 with PID 40087 started at Wed Mar 6 17:17:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2751: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 40087 at Wed Mar 6 17:17:35 MST 2013 >kill -USR1 40087 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 40087 killed at Wed Mar 6 17:17:35 MST 2013 >ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 40143 >/dev/null 2>/dev/null >selfserv_9218 with PID 40143 found at Wed Mar 6 17:17:35 MST 2013 >selfserv_9218 with PID 40143 started at Wed Mar 6 17:17:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2752: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 40143 at Wed Mar 6 17:17:35 MST 2013 >kill -USR1 40143 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 40143 killed at Wed Mar 6 17:17:35 MST 2013 >ssl.sh: TLS Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 40211 >/dev/null 2>/dev/null >selfserv_9218 with PID 40211 found at Wed Mar 6 17:17:35 MST 2013 >selfserv_9218 with PID 40211 started at Wed Mar 6 17:17:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2753: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 40211 at Wed Mar 6 17:17:35 MST 2013 >kill -USR1 40211 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 40211 killed at Wed Mar 6 17:17:35 MST 2013 >ssl.sh: TLS Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 40267 >/dev/null 2>/dev/null >selfserv_9218 with PID 40267 found at Wed Mar 6 17:17:35 MST 2013 >selfserv_9218 with PID 40267 started at Wed Mar 6 17:17:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2754: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 40267 at Wed Mar 6 17:17:35 MST 2013 >kill -USR1 40267 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 40267 killed at Wed Mar 6 17:17:35 MST 2013 >ssl.sh: TLS Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:35 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:35 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 40323 >/dev/null 2>/dev/null >selfserv_9218 with PID 40323 found at Wed Mar 6 17:17:35 MST 2013 >selfserv_9218 with PID 40323 started at Wed Mar 6 17:17:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2755: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 40323 at Wed Mar 6 17:17:36 MST 2013 >kill -USR1 40323 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 40323 killed at Wed Mar 6 17:17:36 MST 2013 >ssl.sh: TLS Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:36 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 40391 >/dev/null 2>/dev/null >selfserv_9218 with PID 40391 found at Wed Mar 6 17:17:36 MST 2013 >selfserv_9218 with PID 40391 started at Wed Mar 6 17:17:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #2756: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 40391 at Wed Mar 6 17:17:36 MST 2013 >kill -USR1 40391 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 40391 killed at Wed Mar 6 17:17:36 MST 2013 >ssl.sh: TLS Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:36 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 40447 >/dev/null 2>/dev/null >selfserv_9218 with PID 40447 found at Wed Mar 6 17:17:36 MST 2013 >selfserv_9218 with PID 40447 started at Wed Mar 6 17:17:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2757: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 40447 at Wed Mar 6 17:17:36 MST 2013 >kill -USR1 40447 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 40447 killed at Wed Mar 6 17:17:36 MST 2013 >ssl.sh: TLS Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:36 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 40503 >/dev/null 2>/dev/null >selfserv_9218 with PID 40503 found at Wed Mar 6 17:17:36 MST 2013 >selfserv_9218 with PID 40503 started at Wed Mar 6 17:17:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #2758: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 40503 at Wed Mar 6 17:17:36 MST 2013 >kill -USR1 40503 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 40503 killed at Wed Mar 6 17:17:36 MST 2013 >ssl.sh: TLS Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:36 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 40571 >/dev/null 2>/dev/null >selfserv_9218 with PID 40571 found at Wed Mar 6 17:17:36 MST 2013 >selfserv_9218 with PID 40571 started at Wed Mar 6 17:17:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #2759: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 40571 at Wed Mar 6 17:17:36 MST 2013 >kill -USR1 40571 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 40571 killed at Wed Mar 6 17:17:36 MST 2013 >ssl.sh: TLS Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:36 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 40627 >/dev/null 2>/dev/null >selfserv_9218 with PID 40627 found at Wed Mar 6 17:17:36 MST 2013 >selfserv_9218 with PID 40627 started at Wed Mar 6 17:17:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #2760: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 40627 at Wed Mar 6 17:17:36 MST 2013 >kill -USR1 40627 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 40627 killed at Wed Mar 6 17:17:36 MST 2013 >ssl.sh: TLS Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:36 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 40683 >/dev/null 2>/dev/null >selfserv_9218 with PID 40683 found at Wed Mar 6 17:17:36 MST 2013 >selfserv_9218 with PID 40683 started at Wed Mar 6 17:17:36 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #2761: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 40683 at Wed Mar 6 17:17:37 MST 2013 >kill -USR1 40683 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 40683 killed at Wed Mar 6 17:17:37 MST 2013 >ssl.sh: TLS Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 40751 >/dev/null 2>/dev/null >selfserv_9218 with PID 40751 found at Wed Mar 6 17:17:37 MST 2013 >selfserv_9218 with PID 40751 started at Wed Mar 6 17:17:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #2762: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 40751 at Wed Mar 6 17:17:37 MST 2013 >kill -USR1 40751 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 40751 killed at Wed Mar 6 17:17:37 MST 2013 >ssl.sh: TLS Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 40807 >/dev/null 2>/dev/null >selfserv_9218 with PID 40807 found at Wed Mar 6 17:17:37 MST 2013 >selfserv_9218 with PID 40807 started at Wed Mar 6 17:17:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #2763: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 40807 at Wed Mar 6 17:17:37 MST 2013 >kill -USR1 40807 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 40807 killed at Wed Mar 6 17:17:37 MST 2013 >ssl.sh: TLS Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 40863 >/dev/null 2>/dev/null >selfserv_9218 with PID 40863 found at Wed Mar 6 17:17:37 MST 2013 >selfserv_9218 with PID 40863 started at Wed Mar 6 17:17:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #2764: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 40863 at Wed Mar 6 17:17:37 MST 2013 >kill -USR1 40863 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 40863 killed at Wed Mar 6 17:17:37 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 40931 >/dev/null 2>/dev/null >selfserv_9218 with PID 40931 found at Wed Mar 6 17:17:37 MST 2013 >selfserv_9218 with PID 40931 started at Wed Mar 6 17:17:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #2765: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 40931 at Wed Mar 6 17:17:37 MST 2013 >kill -USR1 40931 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 40931 killed at Wed Mar 6 17:17:37 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 40987 >/dev/null 2>/dev/null >selfserv_9218 with PID 40987 found at Wed Mar 6 17:17:37 MST 2013 >selfserv_9218 with PID 40987 started at Wed Mar 6 17:17:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2766: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 40987 at Wed Mar 6 17:17:37 MST 2013 >kill -USR1 40987 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 40987 killed at Wed Mar 6 17:17:37 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 41043 >/dev/null 2>/dev/null >selfserv_9218 with PID 41043 found at Wed Mar 6 17:17:37 MST 2013 >selfserv_9218 with PID 41043 started at Wed Mar 6 17:17:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #2767: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 41043 at Wed Mar 6 17:17:37 MST 2013 >kill -USR1 41043 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 41043 killed at Wed Mar 6 17:17:37 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:37 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 41111 >/dev/null 2>/dev/null >selfserv_9218 with PID 41111 found at Wed Mar 6 17:17:37 MST 2013 >selfserv_9218 with PID 41111 started at Wed Mar 6 17:17:37 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2768: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 41111 at Wed Mar 6 17:17:38 MST 2013 >kill -USR1 41111 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 41111 killed at Wed Mar 6 17:17:38 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 41167 >/dev/null 2>/dev/null >selfserv_9218 with PID 41167 found at Wed Mar 6 17:17:38 MST 2013 >selfserv_9218 with PID 41167 started at Wed Mar 6 17:17:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2769: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 41167 at Wed Mar 6 17:17:38 MST 2013 >kill -USR1 41167 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 41167 killed at Wed Mar 6 17:17:38 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 41223 >/dev/null 2>/dev/null >selfserv_9218 with PID 41223 found at Wed Mar 6 17:17:38 MST 2013 >selfserv_9218 with PID 41223 started at Wed Mar 6 17:17:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2770: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 41223 at Wed Mar 6 17:17:38 MST 2013 >kill -USR1 41223 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 41223 killed at Wed Mar 6 17:17:38 MST 2013 >ssl.sh: SSL3 Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 41291 >/dev/null 2>/dev/null >selfserv_9218 with PID 41291 found at Wed Mar 6 17:17:38 MST 2013 >selfserv_9218 with PID 41291 started at Wed Mar 6 17:17:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2771: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 41291 at Wed Mar 6 17:17:38 MST 2013 >kill -USR1 41291 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 41291 killed at Wed Mar 6 17:17:38 MST 2013 >ssl.sh: SSL3 Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 41347 >/dev/null 2>/dev/null >selfserv_9218 with PID 41347 found at Wed Mar 6 17:17:38 MST 2013 >selfserv_9218 with PID 41347 started at Wed Mar 6 17:17:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2772: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 41347 at Wed Mar 6 17:17:38 MST 2013 >kill -USR1 41347 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 41347 killed at Wed Mar 6 17:17:38 MST 2013 >ssl.sh: SSL3 Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 41403 >/dev/null 2>/dev/null >selfserv_9218 with PID 41403 found at Wed Mar 6 17:17:38 MST 2013 >selfserv_9218 with PID 41403 started at Wed Mar 6 17:17:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2773: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 41403 at Wed Mar 6 17:17:38 MST 2013 >kill -USR1 41403 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 41403 killed at Wed Mar 6 17:17:38 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 41471 >/dev/null 2>/dev/null >selfserv_9218 with PID 41471 found at Wed Mar 6 17:17:38 MST 2013 >selfserv_9218 with PID 41471 started at Wed Mar 6 17:17:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #2774: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 41471 at Wed Mar 6 17:17:38 MST 2013 >kill -USR1 41471 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 41471 killed at Wed Mar 6 17:17:38 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:38 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 41527 >/dev/null 2>/dev/null >selfserv_9218 with PID 41527 found at Wed Mar 6 17:17:38 MST 2013 >selfserv_9218 with PID 41527 started at Wed Mar 6 17:17:38 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2775: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 41527 at Wed Mar 6 17:17:39 MST 2013 >kill -USR1 41527 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 41527 killed at Wed Mar 6 17:17:39 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 41583 >/dev/null 2>/dev/null >selfserv_9218 with PID 41583 found at Wed Mar 6 17:17:39 MST 2013 >selfserv_9218 with PID 41583 started at Wed Mar 6 17:17:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #2776: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 41583 at Wed Mar 6 17:17:39 MST 2013 >kill -USR1 41583 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 41583 killed at Wed Mar 6 17:17:39 MST 2013 >ssl.sh: SSL3 Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 41651 >/dev/null 2>/dev/null >selfserv_9218 with PID 41651 found at Wed Mar 6 17:17:39 MST 2013 >selfserv_9218 with PID 41651 started at Wed Mar 6 17:17:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #2777: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 41651 at Wed Mar 6 17:17:39 MST 2013 >kill -USR1 41651 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 41651 killed at Wed Mar 6 17:17:39 MST 2013 >ssl.sh: SSL3 Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 41707 >/dev/null 2>/dev/null >selfserv_9218 with PID 41707 found at Wed Mar 6 17:17:39 MST 2013 >selfserv_9218 with PID 41707 started at Wed Mar 6 17:17:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #2778: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 41707 at Wed Mar 6 17:17:39 MST 2013 >kill -USR1 41707 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 41707 killed at Wed Mar 6 17:17:39 MST 2013 >ssl.sh: SSL3 Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 41763 >/dev/null 2>/dev/null >selfserv_9218 with PID 41763 found at Wed Mar 6 17:17:39 MST 2013 >selfserv_9218 with PID 41763 started at Wed Mar 6 17:17:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #2779: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 41763 at Wed Mar 6 17:17:39 MST 2013 >kill -USR1 41763 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 41763 killed at Wed Mar 6 17:17:39 MST 2013 >ssl.sh: SSL3 Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 41831 >/dev/null 2>/dev/null >selfserv_9218 with PID 41831 found at Wed Mar 6 17:17:39 MST 2013 >selfserv_9218 with PID 41831 started at Wed Mar 6 17:17:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #2780: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 41831 at Wed Mar 6 17:17:39 MST 2013 >kill -USR1 41831 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 41831 killed at Wed Mar 6 17:17:39 MST 2013 >ssl.sh: SSL3 Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 41887 >/dev/null 2>/dev/null >selfserv_9218 with PID 41887 found at Wed Mar 6 17:17:39 MST 2013 >selfserv_9218 with PID 41887 started at Wed Mar 6 17:17:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #2781: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 41887 at Wed Mar 6 17:17:39 MST 2013 >kill -USR1 41887 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 41887 killed at Wed Mar 6 17:17:39 MST 2013 >ssl.sh: SSL3 Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:39 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 41943 >/dev/null 2>/dev/null >selfserv_9218 with PID 41943 found at Wed Mar 6 17:17:39 MST 2013 >selfserv_9218 with PID 41943 started at Wed Mar 6 17:17:39 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #2782: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 41943 at Wed Mar 6 17:17:40 MST 2013 >kill -USR1 41943 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 41943 killed at Wed Mar 6 17:17:40 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 42011 >/dev/null 2>/dev/null >selfserv_9218 with PID 42011 found at Wed Mar 6 17:17:40 MST 2013 >selfserv_9218 with PID 42011 started at Wed Mar 6 17:17:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #2783: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 42011 at Wed Mar 6 17:17:40 MST 2013 >kill -USR1 42011 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 42011 killed at Wed Mar 6 17:17:40 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 42067 >/dev/null 2>/dev/null >selfserv_9218 with PID 42067 found at Wed Mar 6 17:17:40 MST 2013 >selfserv_9218 with PID 42067 started at Wed Mar 6 17:17:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2784: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 42067 at Wed Mar 6 17:17:40 MST 2013 >kill -USR1 42067 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 42067 killed at Wed Mar 6 17:17:40 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 42123 >/dev/null 2>/dev/null >selfserv_9218 with PID 42123 found at Wed Mar 6 17:17:40 MST 2013 >selfserv_9218 with PID 42123 started at Wed Mar 6 17:17:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #2785: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 42123 at Wed Mar 6 17:17:40 MST 2013 >kill -USR1 42123 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 42123 killed at Wed Mar 6 17:17:40 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 42191 >/dev/null 2>/dev/null >selfserv_9218 with PID 42191 found at Wed Mar 6 17:17:40 MST 2013 >selfserv_9218 with PID 42191 started at Wed Mar 6 17:17:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2786: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 42191 at Wed Mar 6 17:17:40 MST 2013 >kill -USR1 42191 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 42191 killed at Wed Mar 6 17:17:40 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 42247 >/dev/null 2>/dev/null >selfserv_9218 with PID 42247 found at Wed Mar 6 17:17:40 MST 2013 >selfserv_9218 with PID 42247 started at Wed Mar 6 17:17:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2787: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 42247 at Wed Mar 6 17:17:40 MST 2013 >kill -USR1 42247 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 42247 killed at Wed Mar 6 17:17:40 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:40 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 42303 >/dev/null 2>/dev/null >selfserv_9218 with PID 42303 found at Wed Mar 6 17:17:40 MST 2013 >selfserv_9218 with PID 42303 started at Wed Mar 6 17:17:40 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2788: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 42303 at Wed Mar 6 17:17:40 MST 2013 >kill -USR1 42303 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 42303 killed at Wed Mar 6 17:17:41 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 42371 >/dev/null 2>/dev/null >selfserv_9218 with PID 42371 found at Wed Mar 6 17:17:41 MST 2013 >selfserv_9218 with PID 42371 started at Wed Mar 6 17:17:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2789: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 42371 at Wed Mar 6 17:17:41 MST 2013 >kill -USR1 42371 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 42371 killed at Wed Mar 6 17:17:41 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 42427 >/dev/null 2>/dev/null >selfserv_9218 with PID 42427 found at Wed Mar 6 17:17:41 MST 2013 >selfserv_9218 with PID 42427 started at Wed Mar 6 17:17:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2790: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 42427 at Wed Mar 6 17:17:41 MST 2013 >kill -USR1 42427 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 42427 killed at Wed Mar 6 17:17:41 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 42483 >/dev/null 2>/dev/null >selfserv_9218 with PID 42483 found at Wed Mar 6 17:17:41 MST 2013 >selfserv_9218 with PID 42483 started at Wed Mar 6 17:17:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2791: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 42483 at Wed Mar 6 17:17:41 MST 2013 >kill -USR1 42483 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 42483 killed at Wed Mar 6 17:17:41 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 42551 >/dev/null 2>/dev/null >selfserv_9218 with PID 42551 found at Wed Mar 6 17:17:41 MST 2013 >selfserv_9218 with PID 42551 started at Wed Mar 6 17:17:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #2792: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 42551 at Wed Mar 6 17:17:41 MST 2013 >kill -USR1 42551 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 42551 killed at Wed Mar 6 17:17:41 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 42607 >/dev/null 2>/dev/null >selfserv_9218 with PID 42607 found at Wed Mar 6 17:17:41 MST 2013 >selfserv_9218 with PID 42607 started at Wed Mar 6 17:17:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2793: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 42607 at Wed Mar 6 17:17:41 MST 2013 >kill -USR1 42607 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 42607 killed at Wed Mar 6 17:17:41 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 42663 >/dev/null 2>/dev/null >selfserv_9218 with PID 42663 found at Wed Mar 6 17:17:41 MST 2013 >selfserv_9218 with PID 42663 started at Wed Mar 6 17:17:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #2794: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 42663 at Wed Mar 6 17:17:41 MST 2013 >kill -USR1 42663 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 42663 killed at Wed Mar 6 17:17:41 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 42731 >/dev/null 2>/dev/null >selfserv_9218 with PID 42731 found at Wed Mar 6 17:17:41 MST 2013 >selfserv_9218 with PID 42731 started at Wed Mar 6 17:17:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #2795: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 42731 at Wed Mar 6 17:17:42 MST 2013 >kill -USR1 42731 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 42731 killed at Wed Mar 6 17:17:42 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 42787 >/dev/null 2>/dev/null >selfserv_9218 with PID 42787 found at Wed Mar 6 17:17:42 MST 2013 >selfserv_9218 with PID 42787 started at Wed Mar 6 17:17:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #2796: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 42787 at Wed Mar 6 17:17:42 MST 2013 >kill -USR1 42787 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 42787 killed at Wed Mar 6 17:17:42 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 42843 >/dev/null 2>/dev/null >selfserv_9218 with PID 42843 found at Wed Mar 6 17:17:42 MST 2013 >selfserv_9218 with PID 42843 started at Wed Mar 6 17:17:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #2797: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 42843 at Wed Mar 6 17:17:42 MST 2013 >kill -USR1 42843 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 42843 killed at Wed Mar 6 17:17:42 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 42911 >/dev/null 2>/dev/null >selfserv_9218 with PID 42911 found at Wed Mar 6 17:17:42 MST 2013 >selfserv_9218 with PID 42911 started at Wed Mar 6 17:17:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #2798: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 42911 at Wed Mar 6 17:17:42 MST 2013 >kill -USR1 42911 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 42911 killed at Wed Mar 6 17:17:42 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 42967 >/dev/null 2>/dev/null >selfserv_9218 with PID 42967 found at Wed Mar 6 17:17:42 MST 2013 >selfserv_9218 with PID 42967 started at Wed Mar 6 17:17:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #2799: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 42967 at Wed Mar 6 17:17:42 MST 2013 >kill -USR1 42967 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 42967 killed at Wed Mar 6 17:17:42 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 43023 >/dev/null 2>/dev/null >selfserv_9218 with PID 43023 found at Wed Mar 6 17:17:42 MST 2013 >selfserv_9218 with PID 43023 started at Wed Mar 6 17:17:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #2800: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 43023 at Wed Mar 6 17:17:42 MST 2013 >kill -USR1 43023 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 43023 killed at Wed Mar 6 17:17:42 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:42 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 43091 >/dev/null 2>/dev/null >selfserv_9218 with PID 43091 found at Wed Mar 6 17:17:42 MST 2013 >selfserv_9218 with PID 43091 started at Wed Mar 6 17:17:42 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #2801: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 43091 at Wed Mar 6 17:17:42 MST 2013 >kill -USR1 43091 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 43091 killed at Wed Mar 6 17:17:42 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:43 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 43147 >/dev/null 2>/dev/null >selfserv_9218 with PID 43147 found at Wed Mar 6 17:17:43 MST 2013 >selfserv_9218 with PID 43147 started at Wed Mar 6 17:17:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2802: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 43147 at Wed Mar 6 17:17:43 MST 2013 >kill -USR1 43147 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 43147 killed at Wed Mar 6 17:17:43 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:43 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 43203 >/dev/null 2>/dev/null >selfserv_9218 with PID 43203 found at Wed Mar 6 17:17:43 MST 2013 >selfserv_9218 with PID 43203 started at Wed Mar 6 17:17:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #2803: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 43203 at Wed Mar 6 17:17:43 MST 2013 >kill -USR1 43203 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 43203 killed at Wed Mar 6 17:17:43 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:43 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 43271 >/dev/null 2>/dev/null >selfserv_9218 with PID 43271 found at Wed Mar 6 17:17:43 MST 2013 >selfserv_9218 with PID 43271 started at Wed Mar 6 17:17:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2804: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 43271 at Wed Mar 6 17:17:43 MST 2013 >kill -USR1 43271 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 43271 killed at Wed Mar 6 17:17:43 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:43 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 43327 >/dev/null 2>/dev/null >selfserv_9218 with PID 43327 found at Wed Mar 6 17:17:43 MST 2013 >selfserv_9218 with PID 43327 started at Wed Mar 6 17:17:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2805: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 43327 at Wed Mar 6 17:17:43 MST 2013 >kill -USR1 43327 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 43327 killed at Wed Mar 6 17:17:43 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:43 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 43383 >/dev/null 2>/dev/null >selfserv_9218 with PID 43383 found at Wed Mar 6 17:17:43 MST 2013 >selfserv_9218 with PID 43383 started at Wed Mar 6 17:17:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2806: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 43383 at Wed Mar 6 17:17:43 MST 2013 >kill -USR1 43383 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 43383 killed at Wed Mar 6 17:17:43 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:43 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 43451 >/dev/null 2>/dev/null >selfserv_9218 with PID 43451 found at Wed Mar 6 17:17:43 MST 2013 >selfserv_9218 with PID 43451 started at Wed Mar 6 17:17:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2807: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 43451 at Wed Mar 6 17:17:43 MST 2013 >kill -USR1 43451 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 43451 killed at Wed Mar 6 17:17:43 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:43 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 43507 >/dev/null 2>/dev/null >selfserv_9218 with PID 43507 found at Wed Mar 6 17:17:43 MST 2013 >selfserv_9218 with PID 43507 started at Wed Mar 6 17:17:43 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2808: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 43507 at Wed Mar 6 17:17:44 MST 2013 >kill -USR1 43507 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 43507 killed at Wed Mar 6 17:17:44 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:44 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 43563 >/dev/null 2>/dev/null >selfserv_9218 with PID 43563 found at Wed Mar 6 17:17:44 MST 2013 >selfserv_9218 with PID 43563 started at Wed Mar 6 17:17:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2809: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 43563 at Wed Mar 6 17:17:44 MST 2013 >kill -USR1 43563 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 43563 killed at Wed Mar 6 17:17:44 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:44 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 43631 >/dev/null 2>/dev/null >selfserv_9218 with PID 43631 found at Wed Mar 6 17:17:44 MST 2013 >selfserv_9218 with PID 43631 started at Wed Mar 6 17:17:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #2810: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 43631 at Wed Mar 6 17:17:44 MST 2013 >kill -USR1 43631 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 43631 killed at Wed Mar 6 17:17:44 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:44 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 43687 >/dev/null 2>/dev/null >selfserv_9218 with PID 43687 found at Wed Mar 6 17:17:44 MST 2013 >selfserv_9218 with PID 43687 started at Wed Mar 6 17:17:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2811: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 43687 at Wed Mar 6 17:17:44 MST 2013 >kill -USR1 43687 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 43687 killed at Wed Mar 6 17:17:44 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:44 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 43743 >/dev/null 2>/dev/null >selfserv_9218 with PID 43743 found at Wed Mar 6 17:17:44 MST 2013 >selfserv_9218 with PID 43743 started at Wed Mar 6 17:17:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #2812: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 43743 at Wed Mar 6 17:17:44 MST 2013 >kill -USR1 43743 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 43743 killed at Wed Mar 6 17:17:44 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:44 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 43811 >/dev/null 2>/dev/null >selfserv_9218 with PID 43811 found at Wed Mar 6 17:17:44 MST 2013 >selfserv_9218 with PID 43811 started at Wed Mar 6 17:17:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #2813: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 43811 at Wed Mar 6 17:17:44 MST 2013 >kill -USR1 43811 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 43811 killed at Wed Mar 6 17:17:44 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:44 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 43867 >/dev/null 2>/dev/null >selfserv_9218 with PID 43867 found at Wed Mar 6 17:17:44 MST 2013 >selfserv_9218 with PID 43867 started at Wed Mar 6 17:17:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #2814: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 43867 at Wed Mar 6 17:17:44 MST 2013 >kill -USR1 43867 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 43867 killed at Wed Mar 6 17:17:44 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:44 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 43923 >/dev/null 2>/dev/null >selfserv_9218 with PID 43923 found at Wed Mar 6 17:17:44 MST 2013 >selfserv_9218 with PID 43923 started at Wed Mar 6 17:17:44 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #2815: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 43923 at Wed Mar 6 17:17:45 MST 2013 >kill -USR1 43923 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 43923 killed at Wed Mar 6 17:17:45 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:45 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 43991 >/dev/null 2>/dev/null >selfserv_9218 with PID 43991 found at Wed Mar 6 17:17:45 MST 2013 >selfserv_9218 with PID 43991 started at Wed Mar 6 17:17:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #2816: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 43991 at Wed Mar 6 17:17:45 MST 2013 >kill -USR1 43991 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 43991 killed at Wed Mar 6 17:17:45 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:45 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 44047 >/dev/null 2>/dev/null >selfserv_9218 with PID 44047 found at Wed Mar 6 17:17:45 MST 2013 >selfserv_9218 with PID 44047 started at Wed Mar 6 17:17:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #2817: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 44047 at Wed Mar 6 17:17:45 MST 2013 >kill -USR1 44047 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 44047 killed at Wed Mar 6 17:17:45 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:45 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 44103 >/dev/null 2>/dev/null >selfserv_9218 with PID 44103 found at Wed Mar 6 17:17:45 MST 2013 >selfserv_9218 with PID 44103 started at Wed Mar 6 17:17:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #2818: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 44103 at Wed Mar 6 17:17:45 MST 2013 >kill -USR1 44103 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 44103 killed at Wed Mar 6 17:17:45 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:45 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 44171 >/dev/null 2>/dev/null >selfserv_9218 with PID 44171 found at Wed Mar 6 17:17:45 MST 2013 >selfserv_9218 with PID 44171 started at Wed Mar 6 17:17:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #2819: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 44171 at Wed Mar 6 17:17:45 MST 2013 >kill -USR1 44171 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 44171 killed at Wed Mar 6 17:17:45 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:45 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 44227 >/dev/null 2>/dev/null >selfserv_9218 with PID 44227 found at Wed Mar 6 17:17:45 MST 2013 >selfserv_9218 with PID 44227 started at Wed Mar 6 17:17:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2820: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 44227 at Wed Mar 6 17:17:45 MST 2013 >kill -USR1 44227 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 44227 killed at Wed Mar 6 17:17:45 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:45 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 44283 >/dev/null 2>/dev/null >selfserv_9218 with PID 44283 found at Wed Mar 6 17:17:45 MST 2013 >selfserv_9218 with PID 44283 started at Wed Mar 6 17:17:45 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #2821: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 44283 at Wed Mar 6 17:17:45 MST 2013 >kill -USR1 44283 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 44283 killed at Wed Mar 6 17:17:45 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:46 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 44351 >/dev/null 2>/dev/null >selfserv_9218 with PID 44351 found at Wed Mar 6 17:17:46 MST 2013 >selfserv_9218 with PID 44351 started at Wed Mar 6 17:17:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2822: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 44351 at Wed Mar 6 17:17:46 MST 2013 >kill -USR1 44351 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 44351 killed at Wed Mar 6 17:17:46 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:46 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 44407 >/dev/null 2>/dev/null >selfserv_9218 with PID 44407 found at Wed Mar 6 17:17:46 MST 2013 >selfserv_9218 with PID 44407 started at Wed Mar 6 17:17:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2823: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 44407 at Wed Mar 6 17:17:46 MST 2013 >kill -USR1 44407 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 44407 killed at Wed Mar 6 17:17:46 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:46 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 44463 >/dev/null 2>/dev/null >selfserv_9218 with PID 44463 found at Wed Mar 6 17:17:46 MST 2013 >selfserv_9218 with PID 44463 started at Wed Mar 6 17:17:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2824: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 44463 at Wed Mar 6 17:17:46 MST 2013 >kill -USR1 44463 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 44463 killed at Wed Mar 6 17:17:46 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:46 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 44531 >/dev/null 2>/dev/null >selfserv_9218 with PID 44531 found at Wed Mar 6 17:17:46 MST 2013 >selfserv_9218 with PID 44531 started at Wed Mar 6 17:17:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2825: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 44531 at Wed Mar 6 17:17:46 MST 2013 >kill -USR1 44531 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 44531 killed at Wed Mar 6 17:17:46 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:46 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 44587 >/dev/null 2>/dev/null >selfserv_9218 with PID 44587 found at Wed Mar 6 17:17:46 MST 2013 >selfserv_9218 with PID 44587 started at Wed Mar 6 17:17:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2826: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 44587 at Wed Mar 6 17:17:46 MST 2013 >kill -USR1 44587 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 44587 killed at Wed Mar 6 17:17:46 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:46 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 44643 >/dev/null 2>/dev/null >selfserv_9218 with PID 44643 found at Wed Mar 6 17:17:46 MST 2013 >selfserv_9218 with PID 44643 started at Wed Mar 6 17:17:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2827: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 44643 at Wed Mar 6 17:17:46 MST 2013 >kill -USR1 44643 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 44643 killed at Wed Mar 6 17:17:46 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:46 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 44711 >/dev/null 2>/dev/null >selfserv_9218 with PID 44711 found at Wed Mar 6 17:17:46 MST 2013 >selfserv_9218 with PID 44711 started at Wed Mar 6 17:17:46 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #2828: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 44711 at Wed Mar 6 17:17:47 MST 2013 >kill -USR1 44711 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 44711 killed at Wed Mar 6 17:17:47 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:47 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 44767 >/dev/null 2>/dev/null >selfserv_9218 with PID 44767 found at Wed Mar 6 17:17:47 MST 2013 >selfserv_9218 with PID 44767 started at Wed Mar 6 17:17:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2829: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 44767 at Wed Mar 6 17:17:47 MST 2013 >kill -USR1 44767 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 44767 killed at Wed Mar 6 17:17:47 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:47 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 44823 >/dev/null 2>/dev/null >selfserv_9218 with PID 44823 found at Wed Mar 6 17:17:47 MST 2013 >selfserv_9218 with PID 44823 started at Wed Mar 6 17:17:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #2830: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 44823 at Wed Mar 6 17:17:47 MST 2013 >kill -USR1 44823 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 44823 killed at Wed Mar 6 17:17:47 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:47 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 44891 >/dev/null 2>/dev/null >selfserv_9218 with PID 44891 found at Wed Mar 6 17:17:47 MST 2013 >selfserv_9218 with PID 44891 started at Wed Mar 6 17:17:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #2831: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 44891 at Wed Mar 6 17:17:47 MST 2013 >kill -USR1 44891 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 44891 killed at Wed Mar 6 17:17:47 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:47 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 44947 >/dev/null 2>/dev/null >selfserv_9218 with PID 44947 found at Wed Mar 6 17:17:47 MST 2013 >selfserv_9218 with PID 44947 started at Wed Mar 6 17:17:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #2832: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 44947 at Wed Mar 6 17:17:47 MST 2013 >kill -USR1 44947 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 44947 killed at Wed Mar 6 17:17:47 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:47 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 45003 >/dev/null 2>/dev/null >selfserv_9218 with PID 45003 found at Wed Mar 6 17:17:47 MST 2013 >selfserv_9218 with PID 45003 started at Wed Mar 6 17:17:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #2833: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 45003 at Wed Mar 6 17:17:47 MST 2013 >kill -USR1 45003 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 45003 killed at Wed Mar 6 17:17:47 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:47 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 45071 >/dev/null 2>/dev/null >selfserv_9218 with PID 45071 found at Wed Mar 6 17:17:47 MST 2013 >selfserv_9218 with PID 45071 started at Wed Mar 6 17:17:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #2834: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 45071 at Wed Mar 6 17:17:47 MST 2013 >kill -USR1 45071 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 45071 killed at Wed Mar 6 17:17:47 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:47 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 45127 >/dev/null 2>/dev/null >selfserv_9218 with PID 45127 found at Wed Mar 6 17:17:47 MST 2013 >selfserv_9218 with PID 45127 started at Wed Mar 6 17:17:47 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #2835: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 45127 at Wed Mar 6 17:17:48 MST 2013 >kill -USR1 45127 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 45127 killed at Wed Mar 6 17:17:48 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:17:48 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 45183 >/dev/null 2>/dev/null >selfserv_9218 with PID 45183 found at Wed Mar 6 17:17:48 MST 2013 >selfserv_9218 with PID 45183 started at Wed Mar 6 17:17:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #2836: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 45183 at Wed Mar 6 17:17:48 MST 2013 >kill -USR1 45183 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 45183 killed at Wed Mar 6 17:17:48 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:48 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 45251 >/dev/null 2>/dev/null >selfserv_9218 with PID 45251 found at Wed Mar 6 17:17:48 MST 2013 >selfserv_9218 with PID 45251 started at Wed Mar 6 17:17:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #2837: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 45251 at Wed Mar 6 17:17:48 MST 2013 >kill -USR1 45251 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 45251 killed at Wed Mar 6 17:17:48 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:48 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 45307 >/dev/null 2>/dev/null >selfserv_9218 with PID 45307 found at Wed Mar 6 17:17:48 MST 2013 >selfserv_9218 with PID 45307 started at Wed Mar 6 17:17:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #2838: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 45307 at Wed Mar 6 17:17:48 MST 2013 >kill -USR1 45307 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 45307 killed at Wed Mar 6 17:17:48 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:48 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 45363 >/dev/null 2>/dev/null >selfserv_9218 with PID 45363 found at Wed Mar 6 17:17:48 MST 2013 >selfserv_9218 with PID 45363 started at Wed Mar 6 17:17:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #2839: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 45363 at Wed Mar 6 17:17:48 MST 2013 >kill -USR1 45363 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 45363 killed at Wed Mar 6 17:17:48 MST 2013 >ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: Cache CRL SSL Client Tests =============================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/authin.tl.tmp >0 >selfserv_9218 starting at Wed Mar 6 17:17:48 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:48 MST 2013 >selfserv_9218 with PID 45435 started at Wed Mar 6 17:17:48 MST 2013 >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:48 MST 2013 >ssl.sh: #2840: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:48 MST 2013 >ssl.sh: #2841: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:48 MST 2013 >ssl.sh: #2842: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:48 MST 2013 >ssl.sh: #2843: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:48 MST 2013 >ssl.sh: #2844: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:49 MST 2013 >ssl.sh: #2845: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:49 MST 2013 >ssl.sh: #2846: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:49 MST 2013 >ssl.sh: #2847: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:49 MST 2013 >ssl.sh: #2848: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:49 MST 2013 >ssl.sh: #2849: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:49 MST 2013 >ssl.sh: #2850: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:49 MST 2013 >ssl.sh: #2851: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:49 MST 2013 >ssl.sh: #2852: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 114 bytes >tstclnt: Writing 114 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:49 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #2853: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:49 MST 2013 >ssl.sh: #2854: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:49 MST 2013 >ssl.sh: #2855: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:49 MST 2013 >ssl.sh: #2856: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:49 MST 2013 >ssl.sh: #2857: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:49 MST 2013 >ssl.sh: #2858: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:49 MST 2013 >ssl.sh: #2859: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:49 MST 2013 >ssl.sh: #2860: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:49 MST 2013 >ssl.sh: #2861: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:49 MST 2013 >ssl.sh: #2862: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:49 MST 2013 >ssl.sh: #2863: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:50 MST 2013 >ssl.sh: #2864: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:50 MST 2013 >ssl.sh: #2865: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:50 MST 2013 >ssl.sh: #2866: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 114 bytes >tstclnt: Writing 114 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:50 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #2867: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:50 MST 2013 >ssl.sh: #2868: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:50 MST 2013 >ssl.sh: #2869: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:50 MST 2013 >ssl.sh: #2870: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:50 MST 2013 >ssl.sh: #2871: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:50 MST 2013 >ssl.sh: #2872: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:50 MST 2013 >ssl.sh: #2873: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:50 MST 2013 >ssl.sh: #2874: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:50 MST 2013 >ssl.sh: #2875: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:50 MST 2013 >ssl.sh: #2876: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:50 MST 2013 >ssl.sh: #2877: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:50 MST 2013 >ssl.sh: #2878: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:50 MST 2013 >ssl.sh: #2879: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 45435 >/dev/null 2>/dev/null >selfserv_9218 with PID 45435 found at Wed Mar 6 17:17:50 MST 2013 >ssl.sh: #2880: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 45435 at Wed Mar 6 17:17:50 MST 2013 >kill -USR1 45435 >selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 45435 killed at Wed Mar 6 17:17:50 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:50 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:50 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:50 MST 2013 >selfserv_9218 with PID 46857 started at Wed Mar 6 17:17:50 MST 2013 >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:51 MST 2013 >ssl.sh: #2881: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:51 MST 2013 >ssl.sh: #2882: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:51 MST 2013 >ssl.sh: #2883: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:51 MST 2013 >ssl.sh: #2884: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:51 MST 2013 >ssl.sh: #2885: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:51 MST 2013 >ssl.sh: #2886: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:51 MST 2013 >ssl.sh: #2887: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:51 MST 2013 >ssl.sh: #2888: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:51 MST 2013 >ssl.sh: #2889: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:51 MST 2013 >ssl.sh: #2890: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:51 MST 2013 >ssl.sh: #2891: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:51 MST 2013 >ssl.sh: #2892: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:51 MST 2013 >ssl.sh: #2893: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 114 bytes >tstclnt: Writing 114 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:51 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #2894: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:51 MST 2013 >ssl.sh: #2895: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:51 MST 2013 >ssl.sh: #2896: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:51 MST 2013 >ssl.sh: #2897: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:51 MST 2013 >ssl.sh: #2898: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:52 MST 2013 >ssl.sh: #2899: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:52 MST 2013 >ssl.sh: #2900: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:52 MST 2013 >ssl.sh: #2901: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:52 MST 2013 >ssl.sh: #2902: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:52 MST 2013 >ssl.sh: #2903: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:52 MST 2013 >ssl.sh: #2904: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:52 MST 2013 >ssl.sh: #2905: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:52 MST 2013 >ssl.sh: #2906: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:52 MST 2013 >ssl.sh: #2907: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 114 bytes >tstclnt: Writing 114 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:52 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #2908: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:52 MST 2013 >ssl.sh: #2909: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:52 MST 2013 >ssl.sh: #2910: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:52 MST 2013 >ssl.sh: #2911: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:52 MST 2013 >ssl.sh: #2912: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:52 MST 2013 >ssl.sh: #2913: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:52 MST 2013 >ssl.sh: #2914: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:52 MST 2013 >ssl.sh: #2915: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:52 MST 2013 >ssl.sh: #2916: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:52 MST 2013 >ssl.sh: #2917: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:53 MST 2013 >ssl.sh: #2918: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:53 MST 2013 >ssl.sh: #2919: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:53 MST 2013 >ssl.sh: #2920: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 46857 >/dev/null 2>/dev/null >selfserv_9218 with PID 46857 found at Wed Mar 6 17:17:53 MST 2013 >ssl.sh: #2921: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 46857 at Wed Mar 6 17:17:53 MST 2013 >kill -USR1 46857 >selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 46857 killed at Wed Mar 6 17:17:53 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:53 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:53 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 48279 >/dev/null 2>/dev/null >selfserv_9218 with PID 48279 found at Wed Mar 6 17:17:53 MST 2013 >selfserv_9218 with PID 48279 started at Wed Mar 6 17:17:53 MST 2013 >ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) >trying to kill selfserv_9218 with PID 48279 at Wed Mar 6 17:17:53 MST 2013 >kill -USR1 48279 >./ssl.sh: line 173: 48279 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9218 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 48279 killed at Wed Mar 6 17:17:53 MST 2013 >selfserv_9218 starting at Wed Mar 6 17:17:53 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:53 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:53 MST 2013 >selfserv_9218 with PID 48321 started at Wed Mar 6 17:17:53 MST 2013 >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:53 MST 2013 >ssl.sh: #2922: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:53 MST 2013 >ssl.sh: #2923: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:53 MST 2013 >ssl.sh: #2924: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:53 MST 2013 >ssl.sh: #2925: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:53 MST 2013 >ssl.sh: #2926: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:53 MST 2013 >ssl.sh: #2927: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:53 MST 2013 >ssl.sh: #2928: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:53 MST 2013 >ssl.sh: #2929: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:53 MST 2013 >ssl.sh: #2930: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:53 MST 2013 >ssl.sh: #2931: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:53 MST 2013 >ssl.sh: #2932: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:53 MST 2013 >ssl.sh: #2933: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:54 MST 2013 >ssl.sh: #2934: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 114 bytes >tstclnt: Writing 114 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:54 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #2935: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:54 MST 2013 >ssl.sh: #2936: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:54 MST 2013 >ssl.sh: #2937: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:54 MST 2013 >ssl.sh: #2938: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:54 MST 2013 >ssl.sh: #2939: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:54 MST 2013 >ssl.sh: #2940: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:54 MST 2013 >ssl.sh: #2941: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:54 MST 2013 >ssl.sh: #2942: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:54 MST 2013 >ssl.sh: #2943: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:54 MST 2013 >ssl.sh: #2944: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:54 MST 2013 >ssl.sh: #2945: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:54 MST 2013 >ssl.sh: #2946: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:54 MST 2013 >ssl.sh: #2947: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:54 MST 2013 >ssl.sh: #2948: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 114 bytes >tstclnt: Writing 114 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:54 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #2949: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:54 MST 2013 >ssl.sh: #2950: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:54 MST 2013 >ssl.sh: #2951: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:55 MST 2013 >ssl.sh: #2952: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:55 MST 2013 >ssl.sh: #2953: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:55 MST 2013 >ssl.sh: #2954: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:55 MST 2013 >ssl.sh: #2955: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:55 MST 2013 >ssl.sh: #2956: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:55 MST 2013 >ssl.sh: #2957: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:55 MST 2013 >ssl.sh: #2958: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:55 MST 2013 >ssl.sh: #2959: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:55 MST 2013 >ssl.sh: #2960: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:55 MST 2013 >ssl.sh: #2961: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 48321 >/dev/null 2>/dev/null >selfserv_9218 with PID 48321 found at Wed Mar 6 17:17:55 MST 2013 >ssl.sh: #2962: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 48321 at Wed Mar 6 17:17:55 MST 2013 >kill -USR1 48321 >selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 48321 killed at Wed Mar 6 17:17:55 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:55 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:55 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:55 MST 2013 >selfserv_9218 with PID 49743 started at Wed Mar 6 17:17:55 MST 2013 >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:55 MST 2013 >ssl.sh: #2963: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:55 MST 2013 >ssl.sh: #2964: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:55 MST 2013 >ssl.sh: #2965: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:55 MST 2013 >ssl.sh: #2966: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:55 MST 2013 >ssl.sh: #2967: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:56 MST 2013 >ssl.sh: #2968: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:56 MST 2013 >ssl.sh: #2969: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:56 MST 2013 >ssl.sh: #2970: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:56 MST 2013 >ssl.sh: #2971: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:56 MST 2013 >ssl.sh: #2972: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:56 MST 2013 >ssl.sh: #2973: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:56 MST 2013 >ssl.sh: #2974: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:56 MST 2013 >ssl.sh: #2975: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 114 bytes >tstclnt: Writing 114 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:56 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #2976: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:56 MST 2013 >ssl.sh: #2977: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:56 MST 2013 >ssl.sh: #2978: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:56 MST 2013 >ssl.sh: #2979: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:56 MST 2013 >ssl.sh: #2980: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:56 MST 2013 >ssl.sh: #2981: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:56 MST 2013 >ssl.sh: #2982: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:56 MST 2013 >ssl.sh: #2983: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:56 MST 2013 >ssl.sh: #2984: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:56 MST 2013 >ssl.sh: #2985: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:57 MST 2013 >ssl.sh: #2986: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:57 MST 2013 >ssl.sh: #2987: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:57 MST 2013 >ssl.sh: #2988: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:57 MST 2013 >ssl.sh: #2989: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 114 bytes >tstclnt: Writing 114 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:57 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #2990: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:57 MST 2013 >ssl.sh: #2991: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:57 MST 2013 >ssl.sh: #2992: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:57 MST 2013 >ssl.sh: #2993: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:57 MST 2013 >ssl.sh: #2994: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:57 MST 2013 >ssl.sh: #2995: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:57 MST 2013 >ssl.sh: #2996: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:57 MST 2013 >ssl.sh: #2997: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:57 MST 2013 >ssl.sh: #2998: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:57 MST 2013 >ssl.sh: #2999: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:57 MST 2013 >ssl.sh: #3000: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:57 MST 2013 >ssl.sh: #3001: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:57 MST 2013 >ssl.sh: #3002: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 49743 >/dev/null 2>/dev/null >selfserv_9218 with PID 49743 found at Wed Mar 6 17:17:57 MST 2013 >ssl.sh: #3003: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 49743 at Wed Mar 6 17:17:57 MST 2013 >kill -USR1 49743 >selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 49743 killed at Wed Mar 6 17:17:57 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:17:58 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:17:58 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:58 MST 2013 >selfserv_9218 with PID 51167 started at Wed Mar 6 17:17:58 MST 2013 >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:58 MST 2013 >ssl.sh: #3004: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:58 MST 2013 >ssl.sh: #3005: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:58 MST 2013 >ssl.sh: #3006: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:58 MST 2013 >ssl.sh: #3007: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:58 MST 2013 >ssl.sh: #3008: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:58 MST 2013 >ssl.sh: #3009: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:58 MST 2013 >ssl.sh: #3010: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:58 MST 2013 >ssl.sh: #3011: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:58 MST 2013 >ssl.sh: #3012: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:58 MST 2013 >ssl.sh: #3013: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:58 MST 2013 >ssl.sh: #3014: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:58 MST 2013 >ssl.sh: #3015: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:58 MST 2013 >ssl.sh: #3016: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 114 bytes >tstclnt: Writing 114 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:58 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #3017: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:58 MST 2013 >ssl.sh: #3018: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:58 MST 2013 >ssl.sh: #3019: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:58 MST 2013 >ssl.sh: #3020: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:59 MST 2013 >ssl.sh: #3021: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:59 MST 2013 >ssl.sh: #3022: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:59 MST 2013 >ssl.sh: #3023: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:59 MST 2013 >ssl.sh: #3024: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:59 MST 2013 >ssl.sh: #3025: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:59 MST 2013 >ssl.sh: #3026: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:59 MST 2013 >ssl.sh: #3027: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:59 MST 2013 >ssl.sh: #3028: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:59 MST 2013 >ssl.sh: #3029: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:59 MST 2013 >ssl.sh: #3030: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 114 bytes >tstclnt: Writing 114 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:59 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #3031: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:59 MST 2013 >ssl.sh: #3032: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:59 MST 2013 >ssl.sh: #3033: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:59 MST 2013 >ssl.sh: #3034: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:59 MST 2013 >ssl.sh: #3035: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:59 MST 2013 >ssl.sh: #3036: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:59 MST 2013 >ssl.sh: #3037: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:17:59 MST 2013 >ssl.sh: #3038: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:18:00 MST 2013 >ssl.sh: #3039: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:18:00 MST 2013 >ssl.sh: #3040: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:18:00 MST 2013 >ssl.sh: #3041: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:18:00 MST 2013 >ssl.sh: #3042: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:18:00 MST 2013 >ssl.sh: #3043: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 51167 >/dev/null 2>/dev/null >selfserv_9218 with PID 51167 found at Wed Mar 6 17:18:00 MST 2013 >ssl.sh: #3044: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 51167 at Wed Mar 6 17:18:00 MST 2013 >kill -USR1 51167 >selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 51167 killed at Wed Mar 6 17:18:00 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:00 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 52589 >/dev/null 2>/dev/null >selfserv_9218 with PID 52589 found at Wed Mar 6 17:18:00 MST 2013 >selfserv_9218 with PID 52589 started at Wed Mar 6 17:18:00 MST 2013 >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >trying to kill selfserv_9218 with PID 52589 at Wed Mar 6 17:18:00 MST 2013 >kill -USR1 52589 >./ssl.sh: line 173: 52589 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9218 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 52589 killed at Wed Mar 6 17:18:00 MST 2013 >selfserv_9218 starting at Wed Mar 6 17:18:00 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:00 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:00 MST 2013 >selfserv_9218 with PID 52631 started at Wed Mar 6 17:18:00 MST 2013 >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:00 MST 2013 >ssl.sh: #3045: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:00 MST 2013 >ssl.sh: #3046: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:00 MST 2013 >ssl.sh: #3047: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:00 MST 2013 >ssl.sh: #3048: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:00 MST 2013 >ssl.sh: #3049: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:00 MST 2013 >ssl.sh: #3050: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:00 MST 2013 >ssl.sh: #3051: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:00 MST 2013 >ssl.sh: #3052: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:00 MST 2013 >ssl.sh: #3053: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:01 MST 2013 >ssl.sh: #3054: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:01 MST 2013 >ssl.sh: #3055: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:01 MST 2013 >ssl.sh: #3056: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:01 MST 2013 >ssl.sh: #3057: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 114 bytes >tstclnt: Writing 114 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:01 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #3058: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:01 MST 2013 >ssl.sh: #3059: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:01 MST 2013 >ssl.sh: #3060: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:01 MST 2013 >ssl.sh: #3061: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:01 MST 2013 >ssl.sh: #3062: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:01 MST 2013 >ssl.sh: #3063: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:01 MST 2013 >ssl.sh: #3064: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:01 MST 2013 >ssl.sh: #3065: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:01 MST 2013 >ssl.sh: #3066: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:01 MST 2013 >ssl.sh: #3067: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:01 MST 2013 >ssl.sh: #3068: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:01 MST 2013 >ssl.sh: #3069: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:01 MST 2013 >ssl.sh: #3070: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:01 MST 2013 >ssl.sh: #3071: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 114 bytes >tstclnt: Writing 114 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:02 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #3072: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:02 MST 2013 >ssl.sh: #3073: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:02 MST 2013 >ssl.sh: #3074: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:02 MST 2013 >ssl.sh: #3075: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:02 MST 2013 >ssl.sh: #3076: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:02 MST 2013 >ssl.sh: #3077: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:02 MST 2013 >ssl.sh: #3078: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:02 MST 2013 >ssl.sh: #3079: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:02 MST 2013 >ssl.sh: #3080: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:02 MST 2013 >ssl.sh: #3081: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:02 MST 2013 >ssl.sh: #3082: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:02 MST 2013 >ssl.sh: #3083: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:02 MST 2013 >ssl.sh: #3084: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 52631 >/dev/null 2>/dev/null >selfserv_9218 with PID 52631 found at Wed Mar 6 17:18:02 MST 2013 >ssl.sh: #3085: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 52631 at Wed Mar 6 17:18:02 MST 2013 >kill -USR1 52631 >selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 52631 killed at Wed Mar 6 17:18:02 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:02 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:02 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:02 MST 2013 >selfserv_9218 with PID 54053 started at Wed Mar 6 17:18:02 MST 2013 >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:02 MST 2013 >ssl.sh: #3086: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:02 MST 2013 >ssl.sh: #3087: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:02 MST 2013 >ssl.sh: #3088: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:03 MST 2013 >ssl.sh: #3089: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:03 MST 2013 >ssl.sh: #3090: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:03 MST 2013 >ssl.sh: #3091: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:03 MST 2013 >ssl.sh: #3092: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:03 MST 2013 >ssl.sh: #3093: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:03 MST 2013 >ssl.sh: #3094: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:03 MST 2013 >ssl.sh: #3095: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:03 MST 2013 >ssl.sh: #3096: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:03 MST 2013 >ssl.sh: #3097: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:03 MST 2013 >ssl.sh: #3098: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 114 bytes >tstclnt: Writing 114 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:03 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #3099: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:03 MST 2013 >ssl.sh: #3100: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:03 MST 2013 >ssl.sh: #3101: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:03 MST 2013 >ssl.sh: #3102: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:03 MST 2013 >ssl.sh: #3103: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:03 MST 2013 >ssl.sh: #3104: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:03 MST 2013 >ssl.sh: #3105: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:03 MST 2013 >ssl.sh: #3106: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:04 MST 2013 >ssl.sh: #3107: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:04 MST 2013 >ssl.sh: #3108: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:04 MST 2013 >ssl.sh: #3109: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:04 MST 2013 >ssl.sh: #3110: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:04 MST 2013 >ssl.sh: #3111: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:04 MST 2013 >ssl.sh: #3112: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 114 bytes >tstclnt: Writing 114 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:04 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #3113: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:04 MST 2013 >ssl.sh: #3114: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:04 MST 2013 >ssl.sh: #3115: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:04 MST 2013 >ssl.sh: #3116: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:04 MST 2013 >ssl.sh: #3117: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:04 MST 2013 >ssl.sh: #3118: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:04 MST 2013 >ssl.sh: #3119: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:04 MST 2013 >ssl.sh: #3120: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:04 MST 2013 >ssl.sh: #3121: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:04 MST 2013 >ssl.sh: #3122: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:04 MST 2013 >ssl.sh: #3123: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:04 MST 2013 >ssl.sh: #3124: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:05 MST 2013 >ssl.sh: #3125: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 54053 >/dev/null 2>/dev/null >selfserv_9218 with PID 54053 found at Wed Mar 6 17:18:05 MST 2013 >ssl.sh: #3126: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 54053 at Wed Mar 6 17:18:05 MST 2013 >kill -USR1 54053 >selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 54053 killed at Wed Mar 6 17:18:05 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:05 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:05 MST 2013 >selfserv_9218 with PID 55475 started at Wed Mar 6 17:18:05 MST 2013 >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:05 MST 2013 >ssl.sh: #3127: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:05 MST 2013 >ssl.sh: #3128: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:05 MST 2013 >ssl.sh: #3129: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:05 MST 2013 >ssl.sh: #3130: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:05 MST 2013 >ssl.sh: #3131: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:05 MST 2013 >ssl.sh: #3132: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:05 MST 2013 >ssl.sh: #3133: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:05 MST 2013 >ssl.sh: #3134: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:05 MST 2013 >ssl.sh: #3135: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:05 MST 2013 >ssl.sh: #3136: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:06 MST 2013 >ssl.sh: #3137: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:06 MST 2013 >ssl.sh: #3138: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:06 MST 2013 >ssl.sh: #3139: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 114 bytes >tstclnt: Writing 114 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:06 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #3140: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:06 MST 2013 >ssl.sh: #3141: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:06 MST 2013 >ssl.sh: #3142: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:06 MST 2013 >ssl.sh: #3143: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:06 MST 2013 >ssl.sh: #3144: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:06 MST 2013 >ssl.sh: #3145: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:06 MST 2013 >ssl.sh: #3146: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:06 MST 2013 >ssl.sh: #3147: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:07 MST 2013 >ssl.sh: #3148: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:07 MST 2013 >ssl.sh: #3149: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:07 MST 2013 >ssl.sh: #3150: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:07 MST 2013 >ssl.sh: #3151: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:07 MST 2013 >ssl.sh: #3152: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:07 MST 2013 >ssl.sh: #3153: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 >RELOAD time >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 114 bytes >tstclnt: Writing 114 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:07 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #3154: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:07 MST 2013 >ssl.sh: #3155: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:07 MST 2013 >ssl.sh: #3156: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:07 MST 2013 >ssl.sh: #3157: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:07 MST 2013 >ssl.sh: #3158: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:07 MST 2013 >ssl.sh: #3159: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:07 MST 2013 >ssl.sh: #3160: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:07 MST 2013 >ssl.sh: #3161: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:07 MST 2013 >ssl.sh: #3162: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:07 MST 2013 >ssl.sh: #3163: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:07 MST 2013 >ssl.sh: #3164: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:07 MST 2013 >ssl.sh: #3165: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:08 MST 2013 >ssl.sh: #3166: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 55475 >/dev/null 2>/dev/null >selfserv_9218 with PID 55475 found at Wed Mar 6 17:18:08 MST 2013 >ssl.sh: #3167: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 55475 at Wed Mar 6 17:18:08 MST 2013 >kill -USR1 55475 >selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 55475 killed at Wed Mar 6 17:18:08 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 56897 >/dev/null 2>/dev/null >selfserv_9218 with PID 56897 found at Wed Mar 6 17:18:08 MST 2013 >selfserv_9218 with PID 56897 started at Wed Mar 6 17:18:08 MST 2013 >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) >trying to kill selfserv_9218 with PID 56897 at Wed Mar 6 17:18:08 MST 2013 >kill -USR1 56897 >./ssl.sh: line 173: 56897 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9218 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 56897 killed at Wed Mar 6 17:18:08 MST 2013 >ssl.sh: SSL Cipher Coverage - server bypass/client bypass =============================== >selfserv_9218 starting at Wed Mar 6 17:18:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:08 MST 2013 >selfserv_9218 with PID 56945 started at Wed Mar 6 17:18:08 MST 2013 >ssl.sh: running SSL2_RC4_128_WITH_MD5 ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c A -V ssl2:ssl3 -O -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3168: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c B -V ssl2:tls1.0 -O -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3169: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c C -V ssl2:tls1.0 -O -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3170: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c D -V ssl2:ssl3 -O -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3171: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c E -V ssl2:tls1.0 -O -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3172: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c F -V ssl2:ssl3 -O -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3173: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c B -V ssl2:tls1.1 -O -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3174: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c C -V ssl2:tls1.1 -O -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3175: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c E -V ssl2:tls1.1 -O -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: N/A >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 0 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3176: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3177: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3178: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3179: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c f -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3180: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c g -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3181: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3182: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3183: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3184: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c l -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3185: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c m -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3186: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3187: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3188: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3189: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:ssl3 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3190: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3191: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3192: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3193: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c f -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3194: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c g -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3195: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3196: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3197: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3198: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c l -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3199: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c m -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3200: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3201: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3202: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3203: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.0 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3204: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3205: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3206: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3207: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3208: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3209: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3210: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c l -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3211: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c m -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3212: TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3213: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3214: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3215: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- >kill -0 56945 >/dev/null 2>/dev/null >selfserv_9218 with PID 56945 found at Wed Mar 6 17:18:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.1 -B -s \ > -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3216: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >trying to kill selfserv_9218 with PID 56945 at Wed Mar 6 17:18:10 MST 2013 >kill -USR1 56945 >selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 56945 killed at Wed Mar 6 17:18:10 MST 2013 >ssl.sh: SSL Client Authentication - server bypass/client bypass =============================== >ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 58624 >/dev/null 2>/dev/null >selfserv_9218 with PID 58624 found at Wed Mar 6 17:18:10 MST 2013 >selfserv_9218 with PID 58624 started at Wed Mar 6 17:18:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3217: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 58624 at Wed Mar 6 17:18:11 MST 2013 >kill -USR1 58624 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 58624 killed at Wed Mar 6 17:18:11 MST 2013 >ssl.sh: TLS Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 58683 >/dev/null 2>/dev/null >selfserv_9218 with PID 58683 found at Wed Mar 6 17:18:11 MST 2013 >selfserv_9218 with PID 58683 started at Wed Mar 6 17:18:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3218: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 58683 at Wed Mar 6 17:18:11 MST 2013 >kill -USR1 58683 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 58683 killed at Wed Mar 6 17:18:11 MST 2013 >ssl.sh: TLS Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 58740 >/dev/null 2>/dev/null >selfserv_9218 with PID 58740 found at Wed Mar 6 17:18:11 MST 2013 >selfserv_9218 with PID 58740 started at Wed Mar 6 17:18:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3219: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 58740 at Wed Mar 6 17:18:11 MST 2013 >kill -USR1 58740 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 58740 killed at Wed Mar 6 17:18:11 MST 2013 >ssl.sh: TLS Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 58797 >/dev/null 2>/dev/null >selfserv_9218 with PID 58797 found at Wed Mar 6 17:18:11 MST 2013 >selfserv_9218 with PID 58797 started at Wed Mar 6 17:18:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #3220: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 58797 at Wed Mar 6 17:18:11 MST 2013 >kill -USR1 58797 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 58797 killed at Wed Mar 6 17:18:11 MST 2013 >ssl.sh: TLS Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 58854 >/dev/null 2>/dev/null >selfserv_9218 with PID 58854 found at Wed Mar 6 17:18:11 MST 2013 >selfserv_9218 with PID 58854 started at Wed Mar 6 17:18:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #3221: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 58854 at Wed Mar 6 17:18:11 MST 2013 >kill -USR1 58854 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 58854 killed at Wed Mar 6 17:18:11 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 58911 >/dev/null 2>/dev/null >selfserv_9218 with PID 58911 found at Wed Mar 6 17:18:11 MST 2013 >selfserv_9218 with PID 58911 started at Wed Mar 6 17:18:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3222: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 58911 at Wed Mar 6 17:18:11 MST 2013 >kill -USR1 58911 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 58911 killed at Wed Mar 6 17:18:11 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 58968 >/dev/null 2>/dev/null >selfserv_9218 with PID 58968 found at Wed Mar 6 17:18:11 MST 2013 >selfserv_9218 with PID 58968 started at Wed Mar 6 17:18:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3223: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 58968 at Wed Mar 6 17:18:11 MST 2013 >kill -USR1 58968 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 58968 killed at Wed Mar 6 17:18:11 MST 2013 >ssl.sh: SSL3 Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59025 >/dev/null 2>/dev/null >selfserv_9218 with PID 59025 found at Wed Mar 6 17:18:11 MST 2013 >selfserv_9218 with PID 59025 started at Wed Mar 6 17:18:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3224: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 59025 at Wed Mar 6 17:18:12 MST 2013 >kill -USR1 59025 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59025 killed at Wed Mar 6 17:18:12 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:12 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59082 >/dev/null 2>/dev/null >selfserv_9218 with PID 59082 found at Wed Mar 6 17:18:12 MST 2013 >selfserv_9218 with PID 59082 started at Wed Mar 6 17:18:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3225: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 59082 at Wed Mar 6 17:18:12 MST 2013 >kill -USR1 59082 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59082 killed at Wed Mar 6 17:18:12 MST 2013 >ssl.sh: SSL3 Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:12 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59139 >/dev/null 2>/dev/null >selfserv_9218 with PID 59139 found at Wed Mar 6 17:18:12 MST 2013 >selfserv_9218 with PID 59139 started at Wed Mar 6 17:18:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #3226: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 59139 at Wed Mar 6 17:18:12 MST 2013 >kill -USR1 59139 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59139 killed at Wed Mar 6 17:18:12 MST 2013 >ssl.sh: SSL3 Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:12 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59196 >/dev/null 2>/dev/null >selfserv_9218 with PID 59196 found at Wed Mar 6 17:18:12 MST 2013 >selfserv_9218 with PID 59196 started at Wed Mar 6 17:18:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #3227: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 59196 at Wed Mar 6 17:18:12 MST 2013 >kill -USR1 59196 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59196 killed at Wed Mar 6 17:18:12 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:12 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59253 >/dev/null 2>/dev/null >selfserv_9218 with PID 59253 found at Wed Mar 6 17:18:12 MST 2013 >selfserv_9218 with PID 59253 started at Wed Mar 6 17:18:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3228: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 59253 at Wed Mar 6 17:18:12 MST 2013 >kill -USR1 59253 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59253 killed at Wed Mar 6 17:18:12 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:12 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59310 >/dev/null 2>/dev/null >selfserv_9218 with PID 59310 found at Wed Mar 6 17:18:12 MST 2013 >selfserv_9218 with PID 59310 started at Wed Mar 6 17:18:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3229: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 59310 at Wed Mar 6 17:18:12 MST 2013 >kill -USR1 59310 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59310 killed at Wed Mar 6 17:18:12 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:12 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59367 >/dev/null 2>/dev/null >selfserv_9218 with PID 59367 found at Wed Mar 6 17:18:12 MST 2013 >selfserv_9218 with PID 59367 started at Wed Mar 6 17:18:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3230: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 59367 at Wed Mar 6 17:18:12 MST 2013 >kill -USR1 59367 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59367 killed at Wed Mar 6 17:18:12 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:13 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59424 >/dev/null 2>/dev/null >selfserv_9218 with PID 59424 found at Wed Mar 6 17:18:13 MST 2013 >selfserv_9218 with PID 59424 started at Wed Mar 6 17:18:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3231: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 59424 at Wed Mar 6 17:18:13 MST 2013 >kill -USR1 59424 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59424 killed at Wed Mar 6 17:18:13 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:13 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59481 >/dev/null 2>/dev/null >selfserv_9218 with PID 59481 found at Wed Mar 6 17:18:13 MST 2013 >selfserv_9218 with PID 59481 started at Wed Mar 6 17:18:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #3232: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 59481 at Wed Mar 6 17:18:13 MST 2013 >kill -USR1 59481 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59481 killed at Wed Mar 6 17:18:13 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:13 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59538 >/dev/null 2>/dev/null >selfserv_9218 with PID 59538 found at Wed Mar 6 17:18:13 MST 2013 >selfserv_9218 with PID 59538 started at Wed Mar 6 17:18:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #3233: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 59538 at Wed Mar 6 17:18:13 MST 2013 >kill -USR1 59538 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59538 killed at Wed Mar 6 17:18:13 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:13 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59595 >/dev/null 2>/dev/null >selfserv_9218 with PID 59595 found at Wed Mar 6 17:18:13 MST 2013 >selfserv_9218 with PID 59595 started at Wed Mar 6 17:18:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3234: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 59595 at Wed Mar 6 17:18:13 MST 2013 >kill -USR1 59595 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59595 killed at Wed Mar 6 17:18:13 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:13 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59652 >/dev/null 2>/dev/null >selfserv_9218 with PID 59652 found at Wed Mar 6 17:18:13 MST 2013 >selfserv_9218 with PID 59652 started at Wed Mar 6 17:18:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3235: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 59652 at Wed Mar 6 17:18:13 MST 2013 >kill -USR1 59652 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59652 killed at Wed Mar 6 17:18:13 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:13 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59709 >/dev/null 2>/dev/null >selfserv_9218 with PID 59709 found at Wed Mar 6 17:18:13 MST 2013 >selfserv_9218 with PID 59709 started at Wed Mar 6 17:18:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3236: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 59709 at Wed Mar 6 17:18:13 MST 2013 >kill -USR1 59709 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59709 killed at Wed Mar 6 17:18:13 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:13 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59766 >/dev/null 2>/dev/null >selfserv_9218 with PID 59766 found at Wed Mar 6 17:18:13 MST 2013 >selfserv_9218 with PID 59766 started at Wed Mar 6 17:18:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3237: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 59766 at Wed Mar 6 17:18:14 MST 2013 >kill -USR1 59766 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59766 killed at Wed Mar 6 17:18:14 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:14 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59823 >/dev/null 2>/dev/null >selfserv_9218 with PID 59823 found at Wed Mar 6 17:18:14 MST 2013 >selfserv_9218 with PID 59823 started at Wed Mar 6 17:18:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #3238: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 59823 at Wed Mar 6 17:18:14 MST 2013 >kill -USR1 59823 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59823 killed at Wed Mar 6 17:18:14 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:14 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59880 >/dev/null 2>/dev/null >selfserv_9218 with PID 59880 found at Wed Mar 6 17:18:14 MST 2013 >selfserv_9218 with PID 59880 started at Wed Mar 6 17:18:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #3239: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 59880 at Wed Mar 6 17:18:14 MST 2013 >kill -USR1 59880 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59880 killed at Wed Mar 6 17:18:14 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:14 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59937 >/dev/null 2>/dev/null >selfserv_9218 with PID 59937 found at Wed Mar 6 17:18:14 MST 2013 >selfserv_9218 with PID 59937 started at Wed Mar 6 17:18:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3240: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 59937 at Wed Mar 6 17:18:14 MST 2013 >kill -USR1 59937 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59937 killed at Wed Mar 6 17:18:14 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:14 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 59994 >/dev/null 2>/dev/null >selfserv_9218 with PID 59994 found at Wed Mar 6 17:18:14 MST 2013 >selfserv_9218 with PID 59994 started at Wed Mar 6 17:18:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3241: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 59994 at Wed Mar 6 17:18:14 MST 2013 >kill -USR1 59994 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 59994 killed at Wed Mar 6 17:18:14 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:14 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60051 >/dev/null 2>/dev/null >selfserv_9218 with PID 60051 found at Wed Mar 6 17:18:14 MST 2013 >selfserv_9218 with PID 60051 started at Wed Mar 6 17:18:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3242: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60051 at Wed Mar 6 17:18:14 MST 2013 >kill -USR1 60051 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60051 killed at Wed Mar 6 17:18:14 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:14 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60108 >/dev/null 2>/dev/null >selfserv_9218 with PID 60108 found at Wed Mar 6 17:18:14 MST 2013 >selfserv_9218 with PID 60108 started at Wed Mar 6 17:18:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3243: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60108 at Wed Mar 6 17:18:14 MST 2013 >kill -USR1 60108 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60108 killed at Wed Mar 6 17:18:14 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:14 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60165 >/dev/null 2>/dev/null >selfserv_9218 with PID 60165 found at Wed Mar 6 17:18:14 MST 2013 >selfserv_9218 with PID 60165 started at Wed Mar 6 17:18:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #3244: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 60165 at Wed Mar 6 17:18:15 MST 2013 >kill -USR1 60165 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60165 killed at Wed Mar 6 17:18:15 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:15 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60222 >/dev/null 2>/dev/null >selfserv_9218 with PID 60222 found at Wed Mar 6 17:18:15 MST 2013 >selfserv_9218 with PID 60222 started at Wed Mar 6 17:18:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #3245: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 60222 at Wed Mar 6 17:18:15 MST 2013 >kill -USR1 60222 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60222 killed at Wed Mar 6 17:18:15 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:15 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60279 >/dev/null 2>/dev/null >selfserv_9218 with PID 60279 found at Wed Mar 6 17:18:15 MST 2013 >selfserv_9218 with PID 60279 started at Wed Mar 6 17:18:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3246: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60279 at Wed Mar 6 17:18:15 MST 2013 >kill -USR1 60279 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60279 killed at Wed Mar 6 17:18:15 MST 2013 >ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: TLS Server hello response without SNI ---- >selfserv_9218 starting at Wed Mar 6 17:18:15 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60412 >/dev/null 2>/dev/null >selfserv_9218 with PID 60412 found at Wed Mar 6 17:18:15 MST 2013 >selfserv_9218 with PID 60412 started at Wed Mar 6 17:18:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3247: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60412 at Wed Mar 6 17:18:15 MST 2013 >kill -USR1 60412 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60412 killed at Wed Mar 6 17:18:15 MST 2013 >ssl.sh: TLS Server hello response with SNI ---- >selfserv_9218 starting at Wed Mar 6 17:18:15 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60475 >/dev/null 2>/dev/null >selfserv_9218 with PID 60475 found at Wed Mar 6 17:18:15 MST 2013 >selfserv_9218 with PID 60475 started at Wed Mar 6 17:18:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3248: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60475 at Wed Mar 6 17:18:15 MST 2013 >kill -USR1 60475 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60475 killed at Wed Mar 6 17:18:15 MST 2013 >ssl.sh: TLS Server response with alert ---- >selfserv_9218 starting at Wed Mar 6 17:18:15 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60538 >/dev/null 2>/dev/null >selfserv_9218 with PID 60538 found at Wed Mar 6 17:18:15 MST 2013 >selfserv_9218 with PID 60538 started at Wed Mar 6 17:18:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. >tstclnt: exiting with return code 254 >ssl.sh: #3249: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 60538 at Wed Mar 6 17:18:15 MST 2013 >kill -USR1 60538 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60538 killed at Wed Mar 6 17:18:15 MST 2013 >ssl.sh: SSL3 Server hello response without SNI ---- >selfserv_9218 starting at Wed Mar 6 17:18:15 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60601 >/dev/null 2>/dev/null >selfserv_9218 with PID 60601 found at Wed Mar 6 17:18:15 MST 2013 >selfserv_9218 with PID 60601 started at Wed Mar 6 17:18:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:ssl3 -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3250: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60601 at Wed Mar 6 17:18:16 MST 2013 >kill -USR1 60601 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60601 killed at Wed Mar 6 17:18:16 MST 2013 >ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- >selfserv_9218 starting at Wed Mar 6 17:18:16 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60664 >/dev/null 2>/dev/null >selfserv_9218 with PID 60664 found at Wed Mar 6 17:18:16 MST 2013 >selfserv_9218 with PID 60664 started at Wed Mar 6 17:18:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3:ssl3 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12271: >SSL peer cannot verify your certificate. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. >tstclnt: exiting with return code 254 >ssl.sh: #3251: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 60664 at Wed Mar 6 17:18:16 MST 2013 >kill -USR1 60664 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60664 killed at Wed Mar 6 17:18:16 MST 2013 >ssl.sh: TLS Server hello response without SNI ---- >selfserv_9218 starting at Wed Mar 6 17:18:16 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60727 >/dev/null 2>/dev/null >selfserv_9218 with PID 60727 found at Wed Mar 6 17:18:16 MST 2013 >selfserv_9218 with PID 60727 started at Wed Mar 6 17:18:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3252: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60727 at Wed Mar 6 17:18:16 MST 2013 >kill -USR1 60727 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60727 killed at Wed Mar 6 17:18:16 MST 2013 >ssl.sh: TLS Server hello response with SNI ---- >selfserv_9218 starting at Wed Mar 6 17:18:16 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60790 >/dev/null 2>/dev/null >selfserv_9218 with PID 60790 found at Wed Mar 6 17:18:16 MST 2013 >selfserv_9218 with PID 60790 started at Wed Mar 6 17:18:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3253: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 60790 at Wed Mar 6 17:18:16 MST 2013 >kill -USR1 60790 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60790 killed at Wed Mar 6 17:18:16 MST 2013 >ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- >selfserv_9218 starting at Wed Mar 6 17:18:16 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60853 >/dev/null 2>/dev/null >selfserv_9218 with PID 60853 found at Wed Mar 6 17:18:16 MST 2013 >selfserv_9218 with PID 60853 started at Wed Mar 6 17:18:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). >tstclnt: exiting with return code 1 >ssl.sh: #3254: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 60853 at Wed Mar 6 17:18:16 MST 2013 >kill -USR1 60853 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60853 killed at Wed Mar 6 17:18:16 MST 2013 >ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- >selfserv_9218 starting at Wed Mar 6 17:18:16 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60916 >/dev/null 2>/dev/null >selfserv_9218 with PID 60916 found at Wed Mar 6 17:18:16 MST 2013 >selfserv_9218 with PID 60916 started at Wed Mar 6 17:18:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. >tstclnt: exiting with return code 1 >ssl.sh: #3255: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 60916 at Wed Mar 6 17:18:16 MST 2013 >kill -USR1 60916 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60916 killed at Wed Mar 6 17:18:16 MST 2013 >ssl.sh: TLS Server response with alert ---- >selfserv_9218 starting at Wed Mar 6 17:18:16 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 60979 >/dev/null 2>/dev/null >selfserv_9218 with PID 60979 found at Wed Mar 6 17:18:16 MST 2013 >selfserv_9218 with PID 60979 started at Wed Mar 6 17:18:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v -B -s \ > -V ssl3: -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12182: >SSL peer has no certificate for the requested DNS name. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. >tstclnt: exiting with return code 254 >ssl.sh: #3256: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 60979 at Wed Mar 6 17:18:17 MST 2013 >kill -USR1 60979 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 60979 killed at Wed Mar 6 17:18:17 MST 2013 >ssl.sh: SSL Stress Test - server bypass/client bypass =============================== >ssl.sh: Stress SSL2 RC4 128 with MD5 ---- >selfserv_9218 starting at Wed Mar 6 17:18:17 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:17 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61111 >/dev/null 2>/dev/null >selfserv_9218 with PID 61111 found at Wed Mar 6 17:18:17 MST 2013 >selfserv_9218 with PID 61111 started at Wed Mar 6 17:18:17 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -c 1000 -C A \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:17 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: SSL2 - 1 server certificates tested. >strsclnt completed at Wed Mar 6 17:18:17 MST 2013 >ssl.sh: #3257: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 61111 at Wed Mar 6 17:18:17 MST 2013 >kill -USR1 61111 >selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61111 killed at Wed Mar 6 17:18:17 MST 2013 >ssl.sh: Stress SSL3 RC4 128 with MD5 ---- >selfserv_9218 starting at Wed Mar 6 17:18:17 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:17 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61187 >/dev/null 2>/dev/null >selfserv_9218 with PID 61187 found at Wed Mar 6 17:18:17 MST 2013 >selfserv_9218 with PID 61187 started at Wed Mar 6 17:18:17 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:17 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:18:17 MST 2013 >ssl.sh: #3258: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 61187 at Wed Mar 6 17:18:17 MST 2013 >kill -USR1 61187 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61187 killed at Wed Mar 6 17:18:17 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 ---- >selfserv_9218 starting at Wed Mar 6 17:18:17 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:17 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61263 >/dev/null 2>/dev/null >selfserv_9218 with PID 61263 found at Wed Mar 6 17:18:17 MST 2013 >selfserv_9218 with PID 61263 started at Wed Mar 6 17:18:17 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -c 1000 -C c \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:17 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:18:17 MST 2013 >ssl.sh: #3259: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 61263 at Wed Mar 6 17:18:17 MST 2013 >kill -USR1 61263 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61263 killed at Wed Mar 6 17:18:17 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- >selfserv_9218 starting at Wed Mar 6 17:18:18 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61339 >/dev/null 2>/dev/null >selfserv_9218 with PID 61339 found at Wed Mar 6 17:18:18 MST 2013 >selfserv_9218 with PID 61339 started at Wed Mar 6 17:18:18 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -c 1000 -C c -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:18 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:18:18 MST 2013 >ssl.sh: #3260: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 61339 at Wed Mar 6 17:18:18 MST 2013 >kill -USR1 61339 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61339 killed at Wed Mar 6 17:18:18 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- >selfserv_9218 starting at Wed Mar 6 17:18:18 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -u -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61415 >/dev/null 2>/dev/null >selfserv_9218 with PID 61415 found at Wed Mar 6 17:18:18 MST 2013 >selfserv_9218 with PID 61415 started at Wed Mar 6 17:18:18 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:18 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:18:18 MST 2013 >ssl.sh: #3261: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 61415 at Wed Mar 6 17:18:18 MST 2013 >kill -USR1 61415 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61415 killed at Wed Mar 6 17:18:18 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- >selfserv_9218 starting at Wed Mar 6 17:18:18 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61491 >/dev/null 2>/dev/null >selfserv_9218 with PID 61491 found at Wed Mar 6 17:18:18 MST 2013 >selfserv_9218 with PID 61491 started at Wed Mar 6 17:18:18 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:18 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:18:18 MST 2013 >ssl.sh: #3262: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 61491 at Wed Mar 6 17:18:18 MST 2013 >kill -USR1 61491 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61491 killed at Wed Mar 6 17:18:19 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- >selfserv_9218 starting at Wed Mar 6 17:18:19 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61567 >/dev/null 2>/dev/null >selfserv_9218 with PID 61567 found at Wed Mar 6 17:18:19 MST 2013 >selfserv_9218 with PID 61567 started at Wed Mar 6 17:18:19 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:19 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:18:19 MST 2013 >ssl.sh: #3263: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 61567 at Wed Mar 6 17:18:19 MST 2013 >kill -USR1 61567 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61567 killed at Wed Mar 6 17:18:19 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:18:19 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61643 >/dev/null 2>/dev/null >selfserv_9218 with PID 61643 found at Wed Mar 6 17:18:19 MST 2013 >selfserv_9218 with PID 61643 started at Wed Mar 6 17:18:19 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:19 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:18:19 MST 2013 >ssl.sh: #3264: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 61643 at Wed Mar 6 17:18:19 MST 2013 >kill -USR1 61643 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61643 killed at Wed Mar 6 17:18:19 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- >selfserv_9218 starting at Wed Mar 6 17:18:19 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -u -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61725 >/dev/null 2>/dev/null >selfserv_9218 with PID 61725 found at Wed Mar 6 17:18:19 MST 2013 >selfserv_9218 with PID 61725 started at Wed Mar 6 17:18:19 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:19 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:18:20 MST 2013 >ssl.sh: #3265: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 61725 at Wed Mar 6 17:18:20 MST 2013 >kill -USR1 61725 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61725 killed at Wed Mar 6 17:18:20 MST 2013 >ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:20 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61822 >/dev/null 2>/dev/null >selfserv_9218 with PID 61822 found at Wed Mar 6 17:18:20 MST 2013 >selfserv_9218 with PID 61822 started at Wed Mar 6 17:18:20 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:20 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: SSL2 - 100 server certificates tested. >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:18:20 MST 2013 >ssl.sh: #3266: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 61822 at Wed Mar 6 17:18:20 MST 2013 >kill -USR1 61822 >selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61822 killed at Wed Mar 6 17:18:20 MST 2013 >ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:20 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61897 >/dev/null 2>/dev/null >selfserv_9218 with PID 61897 found at Wed Mar 6 17:18:20 MST 2013 >selfserv_9218 with PID 61897 started at Wed Mar 6 17:18:20 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:20 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:18:21 MST 2013 >ssl.sh: #3267: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 61897 at Wed Mar 6 17:18:21 MST 2013 >kill -USR1 61897 >selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61897 killed at Wed Mar 6 17:18:21 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:21 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 61972 >/dev/null 2>/dev/null >selfserv_9218 with PID 61972 found at Wed Mar 6 17:18:21 MST 2013 >selfserv_9218 with PID 61972 started at Wed Mar 6 17:18:21 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:21 MST 2013 >strsclnt: -- SSL: Server Certificate Invalid, err -8182. >Peer's certificate has an invalid signature. >strsclnt: -- SSL: Server Certificate Invalid, err -8182. >Peer's certificate has an invalid signature. >strsclnt: PR_Send returned error -8182: >Peer's certificate has an invalid signature. >selfserv: HDX PR_Read returned error -12271: >SSL peer cannot verify your certificate. >strsclnt: PR_Send returned error -8182: >Peer's certificate has an invalid signature. >selfserv: HDX PR_Read returned error -12271: >SSL peer cannot verify your certificate. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 8 server certificates tested. >strsclnt completed at Wed Mar 6 17:18:21 MST 2013 >ssl.sh: #3268: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED >trying to kill selfserv_9218 with PID 61972 at Wed Mar 6 17:18:21 MST 2013 >kill -USR1 61972 >selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 61972 killed at Wed Mar 6 17:18:21 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:21 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -u -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62047 >/dev/null 2>/dev/null >selfserv_9218 with PID 62047 found at Wed Mar 6 17:18:21 MST 2013 >selfserv_9218 with PID 62047 started at Wed Mar 6 17:18:21 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:21 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:18:21 MST 2013 >ssl.sh: #3269: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 62047 at Wed Mar 6 17:18:21 MST 2013 >kill -USR1 62047 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62047 killed at Wed Mar 6 17:18:21 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:21 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62123 >/dev/null 2>/dev/null >selfserv_9218 with PID 62123 found at Wed Mar 6 17:18:21 MST 2013 >selfserv_9218 with PID 62123 started at Wed Mar 6 17:18:21 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:21 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:18:21 MST 2013 >ssl.sh: #3270: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 62123 at Wed Mar 6 17:18:21 MST 2013 >kill -USR1 62123 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62123 killed at Wed Mar 6 17:18:21 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:18:21 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62199 >/dev/null 2>/dev/null >selfserv_9218 with PID 62199 found at Wed Mar 6 17:18:21 MST 2013 >selfserv_9218 with PID 62199 started at Wed Mar 6 17:18:21 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:21 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:18:21 MST 2013 >ssl.sh: #3271: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 62199 at Wed Mar 6 17:18:21 MST 2013 >kill -USR1 62199 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62199 killed at Wed Mar 6 17:18:21 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:21 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62275 >/dev/null 2>/dev/null >selfserv_9218 with PID 62275 found at Wed Mar 6 17:18:21 MST 2013 >selfserv_9218 with PID 62275 started at Wed Mar 6 17:18:21 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:21 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:18:21 MST 2013 >ssl.sh: #3272: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 62275 at Wed Mar 6 17:18:22 MST 2013 >kill -USR1 62275 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62275 killed at Wed Mar 6 17:18:22 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:18:22 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62351 >/dev/null 2>/dev/null >selfserv_9218 with PID 62351 found at Wed Mar 6 17:18:22 MST 2013 >selfserv_9218 with PID 62351 started at Wed Mar 6 17:18:22 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:22 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:18:22 MST 2013 >ssl.sh: #3273: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 62351 at Wed Mar 6 17:18:22 MST 2013 >kill -USR1 62351 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62351 killed at Wed Mar 6 17:18:22 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- >selfserv_9218 starting at Wed Mar 6 17:18:22 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62433 >/dev/null 2>/dev/null >selfserv_9218 with PID 62433 found at Wed Mar 6 17:18:22 MST 2013 >selfserv_9218 with PID 62433 started at Wed Mar 6 17:18:22 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:22 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:18:22 MST 2013 >ssl.sh: #3274: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 62433 at Wed Mar 6 17:18:22 MST 2013 >kill -USR1 62433 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62433 killed at Wed Mar 6 17:18:22 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- >selfserv_9218 starting at Wed Mar 6 17:18:22 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain -B -s \ > -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62515 >/dev/null 2>/dev/null >selfserv_9218 with PID 62515 found at Wed Mar 6 17:18:22 MST 2013 >selfserv_9218 with PID 62515 started at Wed Mar 6 17:18:22 MST 2013 >strsclnt -q -p 9218 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:22 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:18:22 MST 2013 >ssl.sh: #3275: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 62515 at Wed Mar 6 17:18:22 MST 2013 >kill -USR1 62515 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62515 killed at Wed Mar 6 17:18:22 MST 2013 >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) >ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client bypass =============================== >selfserv_9218 starting at Wed Mar 6 17:18:23 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >selfserv_9218 with PID 62668 started at Wed Mar 6 17:18:23 MST 2013 >ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test >ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test >ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3276: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3277: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3278: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c f -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3279: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c g -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3280: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3281: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3282: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3283: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c l -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3284: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c m -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3285: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3286: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3287: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3288: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:ssl3 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3289: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3290: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3291: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3292: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c f -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3293: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c g -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3294: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3295: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3296: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3297: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c l -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3298: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c m -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3299: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3300: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3301: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3302: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.0 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3303: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c c -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3304: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c d -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3305: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c e -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3306: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c i -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3307: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c j -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3308: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c k -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3309: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c l -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3310: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c m -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3311: TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c n -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3312: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c v -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3313: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c y -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3314: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- >kill -0 62668 >/dev/null 2>/dev/null >selfserv_9218 with PID 62668 found at Wed Mar 6 17:18:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -c z -V ssl3:tls1.1 -B -s \ > -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3315: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_NULL_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) >ssl.sh: skipping TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) >trying to kill selfserv_9218 with PID 62668 at Wed Mar 6 17:18:25 MST 2013 >kill -USR1 62668 >selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 62668 killed at Wed Mar 6 17:18:25 MST 2013 >ssl.sh: SSL Client Authentication Extended Test - server bypass/client bypass =============================== >ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:25 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 64177 >/dev/null 2>/dev/null >selfserv_9218 with PID 64177 found at Wed Mar 6 17:18:25 MST 2013 >selfserv_9218 with PID 64177 started at Wed Mar 6 17:18:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3316: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 64177 at Wed Mar 6 17:18:25 MST 2013 >kill -USR1 64177 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 64177 killed at Wed Mar 6 17:18:25 MST 2013 >ssl.sh: TLS Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:25 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 64234 >/dev/null 2>/dev/null >selfserv_9218 with PID 64234 found at Wed Mar 6 17:18:25 MST 2013 >selfserv_9218 with PID 64234 started at Wed Mar 6 17:18:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3317: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 64234 at Wed Mar 6 17:18:25 MST 2013 >kill -USR1 64234 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 64234 killed at Wed Mar 6 17:18:25 MST 2013 >ssl.sh: TLS Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:25 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 64291 >/dev/null 2>/dev/null >selfserv_9218 with PID 64291 found at Wed Mar 6 17:18:25 MST 2013 >selfserv_9218 with PID 64291 started at Wed Mar 6 17:18:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3318: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 64291 at Wed Mar 6 17:18:25 MST 2013 >kill -USR1 64291 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 64291 killed at Wed Mar 6 17:18:25 MST 2013 >ssl.sh: TLS Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:25 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 64348 >/dev/null 2>/dev/null >selfserv_9218 with PID 64348 found at Wed Mar 6 17:18:25 MST 2013 >selfserv_9218 with PID 64348 started at Wed Mar 6 17:18:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #3319: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 64348 at Wed Mar 6 17:18:25 MST 2013 >kill -USR1 64348 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 64348 killed at Wed Mar 6 17:18:25 MST 2013 >ssl.sh: TLS Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:25 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 64405 >/dev/null 2>/dev/null >selfserv_9218 with PID 64405 found at Wed Mar 6 17:18:25 MST 2013 >selfserv_9218 with PID 64405 started at Wed Mar 6 17:18:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #3320: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 64405 at Wed Mar 6 17:18:25 MST 2013 >kill -USR1 64405 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 64405 killed at Wed Mar 6 17:18:25 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:25 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 64462 >/dev/null 2>/dev/null >selfserv_9218 with PID 64462 found at Wed Mar 6 17:18:26 MST 2013 >selfserv_9218 with PID 64462 started at Wed Mar 6 17:18:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3321: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 64462 at Wed Mar 6 17:18:26 MST 2013 >kill -USR1 64462 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 64462 killed at Wed Mar 6 17:18:26 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:26 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 64519 >/dev/null 2>/dev/null >selfserv_9218 with PID 64519 found at Wed Mar 6 17:18:26 MST 2013 >selfserv_9218 with PID 64519 started at Wed Mar 6 17:18:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3322: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 64519 at Wed Mar 6 17:18:26 MST 2013 >kill -USR1 64519 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 64519 killed at Wed Mar 6 17:18:26 MST 2013 >ssl.sh: SSL3 Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:26 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 64576 >/dev/null 2>/dev/null >selfserv_9218 with PID 64576 found at Wed Mar 6 17:18:26 MST 2013 >selfserv_9218 with PID 64576 started at Wed Mar 6 17:18:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3323: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 64576 at Wed Mar 6 17:18:26 MST 2013 >kill -USR1 64576 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 64576 killed at Wed Mar 6 17:18:26 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:26 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 64633 >/dev/null 2>/dev/null >selfserv_9218 with PID 64633 found at Wed Mar 6 17:18:26 MST 2013 >selfserv_9218 with PID 64633 started at Wed Mar 6 17:18:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3324: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 64633 at Wed Mar 6 17:18:26 MST 2013 >kill -USR1 64633 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 64633 killed at Wed Mar 6 17:18:26 MST 2013 >ssl.sh: SSL3 Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:26 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 64690 >/dev/null 2>/dev/null >selfserv_9218 with PID 64690 found at Wed Mar 6 17:18:26 MST 2013 >selfserv_9218 with PID 64690 started at Wed Mar 6 17:18:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #3325: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 64690 at Wed Mar 6 17:18:26 MST 2013 >kill -USR1 64690 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 64690 killed at Wed Mar 6 17:18:26 MST 2013 >ssl.sh: SSL3 Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:26 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 64747 >/dev/null 2>/dev/null >selfserv_9218 with PID 64747 found at Wed Mar 6 17:18:26 MST 2013 >selfserv_9218 with PID 64747 started at Wed Mar 6 17:18:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #3326: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 64747 at Wed Mar 6 17:18:26 MST 2013 >kill -USR1 64747 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 64747 killed at Wed Mar 6 17:18:26 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:26 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 64804 >/dev/null 2>/dev/null >selfserv_9218 with PID 64804 found at Wed Mar 6 17:18:26 MST 2013 >selfserv_9218 with PID 64804 started at Wed Mar 6 17:18:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3327: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 64804 at Wed Mar 6 17:18:27 MST 2013 >kill -USR1 64804 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 64804 killed at Wed Mar 6 17:18:27 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:27 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 64861 >/dev/null 2>/dev/null >selfserv_9218 with PID 64861 found at Wed Mar 6 17:18:27 MST 2013 >selfserv_9218 with PID 64861 started at Wed Mar 6 17:18:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3328: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 64861 at Wed Mar 6 17:18:27 MST 2013 >kill -USR1 64861 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 64861 killed at Wed Mar 6 17:18:27 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:27 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 64918 >/dev/null 2>/dev/null >selfserv_9218 with PID 64918 found at Wed Mar 6 17:18:27 MST 2013 >selfserv_9218 with PID 64918 started at Wed Mar 6 17:18:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3329: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 64918 at Wed Mar 6 17:18:27 MST 2013 >kill -USR1 64918 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 64918 killed at Wed Mar 6 17:18:27 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:27 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 64975 >/dev/null 2>/dev/null >selfserv_9218 with PID 64975 found at Wed Mar 6 17:18:27 MST 2013 >selfserv_9218 with PID 64975 started at Wed Mar 6 17:18:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3330: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 64975 at Wed Mar 6 17:18:27 MST 2013 >kill -USR1 64975 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 64975 killed at Wed Mar 6 17:18:27 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:27 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 65032 >/dev/null 2>/dev/null >selfserv_9218 with PID 65032 found at Wed Mar 6 17:18:27 MST 2013 >selfserv_9218 with PID 65032 started at Wed Mar 6 17:18:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #3331: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 65032 at Wed Mar 6 17:18:27 MST 2013 >kill -USR1 65032 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 65032 killed at Wed Mar 6 17:18:27 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:27 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 65089 >/dev/null 2>/dev/null >selfserv_9218 with PID 65089 found at Wed Mar 6 17:18:27 MST 2013 >selfserv_9218 with PID 65089 started at Wed Mar 6 17:18:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #3332: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 65089 at Wed Mar 6 17:18:27 MST 2013 >kill -USR1 65089 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 65089 killed at Wed Mar 6 17:18:27 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:27 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 65146 >/dev/null 2>/dev/null >selfserv_9218 with PID 65146 found at Wed Mar 6 17:18:27 MST 2013 >selfserv_9218 with PID 65146 started at Wed Mar 6 17:18:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3333: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 65146 at Wed Mar 6 17:18:27 MST 2013 >kill -USR1 65146 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 65146 killed at Wed Mar 6 17:18:27 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:27 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 65203 >/dev/null 2>/dev/null >selfserv_9218 with PID 65203 found at Wed Mar 6 17:18:28 MST 2013 >selfserv_9218 with PID 65203 started at Wed Mar 6 17:18:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3334: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 65203 at Wed Mar 6 17:18:28 MST 2013 >kill -USR1 65203 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 65203 killed at Wed Mar 6 17:18:28 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:28 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 65260 >/dev/null 2>/dev/null >selfserv_9218 with PID 65260 found at Wed Mar 6 17:18:28 MST 2013 >selfserv_9218 with PID 65260 started at Wed Mar 6 17:18:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3335: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 65260 at Wed Mar 6 17:18:28 MST 2013 >kill -USR1 65260 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 65260 killed at Wed Mar 6 17:18:28 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:28 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 65317 >/dev/null 2>/dev/null >selfserv_9218 with PID 65317 found at Wed Mar 6 17:18:28 MST 2013 >selfserv_9218 with PID 65317 started at Wed Mar 6 17:18:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3336: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 65317 at Wed Mar 6 17:18:28 MST 2013 >kill -USR1 65317 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 65317 killed at Wed Mar 6 17:18:28 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:28 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 65374 >/dev/null 2>/dev/null >selfserv_9218 with PID 65374 found at Wed Mar 6 17:18:28 MST 2013 >selfserv_9218 with PID 65374 started at Wed Mar 6 17:18:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #3337: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 65374 at Wed Mar 6 17:18:28 MST 2013 >kill -USR1 65374 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 65374 killed at Wed Mar 6 17:18:28 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:28 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 65431 >/dev/null 2>/dev/null >selfserv_9218 with PID 65431 found at Wed Mar 6 17:18:28 MST 2013 >selfserv_9218 with PID 65431 started at Wed Mar 6 17:18:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #3338: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 65431 at Wed Mar 6 17:18:28 MST 2013 >kill -USR1 65431 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 65431 killed at Wed Mar 6 17:18:28 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:28 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 65488 >/dev/null 2>/dev/null >selfserv_9218 with PID 65488 found at Wed Mar 6 17:18:28 MST 2013 >selfserv_9218 with PID 65488 started at Wed Mar 6 17:18:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3339: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 65488 at Wed Mar 6 17:18:28 MST 2013 >kill -USR1 65488 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 65488 killed at Wed Mar 6 17:18:28 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:28 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 653 >/dev/null 2>/dev/null >selfserv_9218 with PID 653 found at Wed Mar 6 17:18:28 MST 2013 >selfserv_9218 with PID 653 started at Wed Mar 6 17:18:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3340: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 653 at Wed Mar 6 17:18:29 MST 2013 >kill -USR1 653 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 653 killed at Wed Mar 6 17:18:29 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:29 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 711 >/dev/null 2>/dev/null >selfserv_9218 with PID 711 found at Wed Mar 6 17:18:29 MST 2013 >selfserv_9218 with PID 711 started at Wed Mar 6 17:18:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3341: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 711 at Wed Mar 6 17:18:29 MST 2013 >kill -USR1 711 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 711 killed at Wed Mar 6 17:18:29 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:29 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 806 >/dev/null 2>/dev/null >selfserv_9218 with PID 806 found at Wed Mar 6 17:18:29 MST 2013 >selfserv_9218 with PID 806 started at Wed Mar 6 17:18:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3342: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 806 at Wed Mar 6 17:18:29 MST 2013 >kill -USR1 806 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 806 killed at Wed Mar 6 17:18:29 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:29 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 875 >/dev/null 2>/dev/null >selfserv_9218 with PID 875 found at Wed Mar 6 17:18:29 MST 2013 >selfserv_9218 with PID 875 started at Wed Mar 6 17:18:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #3343: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 875 at Wed Mar 6 17:18:29 MST 2013 >kill -USR1 875 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 875 killed at Wed Mar 6 17:18:29 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:18:29 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 935 >/dev/null 2>/dev/null >selfserv_9218 with PID 935 found at Wed Mar 6 17:18:29 MST 2013 >selfserv_9218 with PID 935 started at Wed Mar 6 17:18:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #3344: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 935 at Wed Mar 6 17:18:29 MST 2013 >kill -USR1 935 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 935 killed at Wed Mar 6 17:18:29 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:29 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 992 >/dev/null 2>/dev/null >selfserv_9218 with PID 992 found at Wed Mar 6 17:18:29 MST 2013 >selfserv_9218 with PID 992 started at Wed Mar 6 17:18:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../ext_client -v -B -s \ > -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #3345: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 992 at Wed Mar 6 17:18:29 MST 2013 >kill -USR1 992 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 992 killed at Wed Mar 6 17:18:29 MST 2013 >ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Server hello response without SNI for Extended Test >ssl.sh: skipping TLS Server hello response with SNI for Extended Test >ssl.sh: skipping TLS Server response with alert for Extended Test >ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test >ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test >ssl.sh: skipping TLS Server hello response without SNI for Extended Test >ssl.sh: skipping TLS Server hello response with SNI for Extended Test >ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test >ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test >ssl.sh: skipping TLS Server response with alert for Extended Test >ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass =============================== >ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test >ssl.sh: Stress SSL3 RC4 128 with MD5 ---- >selfserv_9218 starting at Wed Mar 6 17:18:30 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1219 >/dev/null 2>/dev/null >selfserv_9218 with PID 1219 found at Wed Mar 6 17:18:30 MST 2013 >selfserv_9218 with PID 1219 started at Wed Mar 6 17:18:30 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:30 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:18:30 MST 2013 >ssl.sh: #3346: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 1219 at Wed Mar 6 17:18:30 MST 2013 >kill -USR1 1219 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1219 killed at Wed Mar 6 17:18:30 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 ---- >selfserv_9218 starting at Wed Mar 6 17:18:30 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1394 >/dev/null 2>/dev/null >selfserv_9218 with PID 1394 found at Wed Mar 6 17:18:30 MST 2013 >selfserv_9218 with PID 1394 started at Wed Mar 6 17:18:30 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -c 1000 -C c \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:30 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:18:30 MST 2013 >ssl.sh: #3347: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 1394 at Wed Mar 6 17:18:30 MST 2013 >kill -USR1 1394 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1394 killed at Wed Mar 6 17:18:30 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- >selfserv_9218 starting at Wed Mar 6 17:18:30 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1473 >/dev/null 2>/dev/null >selfserv_9218 with PID 1473 found at Wed Mar 6 17:18:30 MST 2013 >selfserv_9218 with PID 1473 started at Wed Mar 6 17:18:30 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:30 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:18:31 MST 2013 >ssl.sh: #3348: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 1473 at Wed Mar 6 17:18:31 MST 2013 >kill -USR1 1473 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1473 killed at Wed Mar 6 17:18:31 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- >selfserv_9218 starting at Wed Mar 6 17:18:31 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -u -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1549 >/dev/null 2>/dev/null >selfserv_9218 with PID 1549 found at Wed Mar 6 17:18:31 MST 2013 >selfserv_9218 with PID 1549 started at Wed Mar 6 17:18:31 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:31 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:18:31 MST 2013 >ssl.sh: #3349: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 1549 at Wed Mar 6 17:18:31 MST 2013 >kill -USR1 1549 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1549 killed at Wed Mar 6 17:18:31 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- >selfserv_9218 starting at Wed Mar 6 17:18:31 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1625 >/dev/null 2>/dev/null >selfserv_9218 with PID 1625 found at Wed Mar 6 17:18:31 MST 2013 >selfserv_9218 with PID 1625 started at Wed Mar 6 17:18:31 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:31 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:18:31 MST 2013 >ssl.sh: #3350: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 1625 at Wed Mar 6 17:18:31 MST 2013 >kill -USR1 1625 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1625 killed at Wed Mar 6 17:18:31 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- >selfserv_9218 starting at Wed Mar 6 17:18:31 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1701 >/dev/null 2>/dev/null >selfserv_9218 with PID 1701 found at Wed Mar 6 17:18:31 MST 2013 >selfserv_9218 with PID 1701 started at Wed Mar 6 17:18:31 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:31 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:18:32 MST 2013 >ssl.sh: #3351: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 1701 at Wed Mar 6 17:18:32 MST 2013 >kill -USR1 1701 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1701 killed at Wed Mar 6 17:18:32 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:18:32 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1785 >/dev/null 2>/dev/null >selfserv_9218 with PID 1785 found at Wed Mar 6 17:18:32 MST 2013 >selfserv_9218 with PID 1785 started at Wed Mar 6 17:18:32 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:32 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes >strsclnt completed at Wed Mar 6 17:18:32 MST 2013 >ssl.sh: #3352: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 1785 at Wed Mar 6 17:18:32 MST 2013 >kill -USR1 1785 >selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable > 999 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1785 killed at Wed Mar 6 17:18:32 MST 2013 >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test >ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test >ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:32 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 1940 >/dev/null 2>/dev/null >selfserv_9218 with PID 1940 found at Wed Mar 6 17:18:32 MST 2013 >selfserv_9218 with PID 1940 started at Wed Mar 6 17:18:32 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:32 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:18:33 MST 2013 >ssl.sh: #3353: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 1940 at Wed Mar 6 17:18:33 MST 2013 >kill -USR1 1940 >selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 1940 killed at Wed Mar 6 17:18:33 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:33 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 2023 >/dev/null 2>/dev/null >selfserv_9218 with PID 2023 found at Wed Mar 6 17:18:33 MST 2013 >selfserv_9218 with PID 2023 started at Wed Mar 6 17:18:33 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:33 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: NoReuse - 100 server certificates tested. >strsclnt completed at Wed Mar 6 17:18:33 MST 2013 >ssl.sh: #3354: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 2023 at Wed Mar 6 17:18:33 MST 2013 >kill -USR1 2023 >selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 2023 killed at Wed Mar 6 17:18:33 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:33 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -u -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 2100 >/dev/null 2>/dev/null >selfserv_9218 with PID 2100 found at Wed Mar 6 17:18:33 MST 2013 >selfserv_9218 with PID 2100 started at Wed Mar 6 17:18:33 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:33 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:18:33 MST 2013 >ssl.sh: #3355: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 2100 at Wed Mar 6 17:18:33 MST 2013 >kill -USR1 2100 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 2100 killed at Wed Mar 6 17:18:33 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:33 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 2189 >/dev/null 2>/dev/null >selfserv_9218 with PID 2189 found at Wed Mar 6 17:18:33 MST 2013 >selfserv_9218 with PID 2189 started at Wed Mar 6 17:18:33 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:33 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:18:33 MST 2013 >ssl.sh: #3356: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 2189 at Wed Mar 6 17:18:33 MST 2013 >kill -USR1 2189 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 2189 killed at Wed Mar 6 17:18:33 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:18:33 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 2267 >/dev/null 2>/dev/null >selfserv_9218 with PID 2267 found at Wed Mar 6 17:18:34 MST 2013 >selfserv_9218 with PID 2267 started at Wed Mar 6 17:18:34 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:34 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt completed at Wed Mar 6 17:18:34 MST 2013 >ssl.sh: #3357: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 2267 at Wed Mar 6 17:18:34 MST 2013 >kill -USR1 2267 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 2267 killed at Wed Mar 6 17:18:34 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:18:34 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 2354 >/dev/null 2>/dev/null >selfserv_9218 with PID 2354 found at Wed Mar 6 17:18:34 MST 2013 >selfserv_9218 with PID 2354 started at Wed Mar 6 17:18:34 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:34 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:18:34 MST 2013 >ssl.sh: #3358: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 2354 at Wed Mar 6 17:18:34 MST 2013 >kill -USR1 2354 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 2354 killed at Wed Mar 6 17:18:34 MST 2013 >ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- >selfserv_9218 starting at Wed Mar 6 17:18:34 MST 2013 >selfserv_9218 -D -p 9218 -d ../ext_server -n localhost.localdomain -B -s \ > -w nss -r -r -u -z -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:18:34 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -B -s -q \ > -d ../ext_client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 2431 >/dev/null 2>/dev/null >selfserv_9218 with PID 2431 found at Wed Mar 6 17:18:34 MST 2013 >selfserv_9218 with PID 2431 started at Wed Mar 6 17:18:34 MST 2013 >strsclnt -q -p 9218 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ > localhost.localdomain >strsclnt started at Wed Mar 6 17:18:34 MST 2013 >strsclnt: -- SSL: Server Certificate Validated. >strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes >strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes >strsclnt completed at Wed Mar 6 17:18:34 MST 2013 >ssl.sh: #3359: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED >trying to kill selfserv_9218 with PID 2431 at Wed Mar 6 17:18:34 MST 2013 >kill -USR1 2431 >selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable > 99 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 2431 killed at Wed Mar 6 17:18:34 MST 2013 >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test >ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) >ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) >TIMESTAMP ssl END: Wed Mar 6 17:18:34 MST 2013 >Running tests for ocsp >TIMESTAMP ocsp BEGIN: Wed Mar 6 17:18:34 MST 2013 >ocsp.sh: OCSP tests =============================== >TIMESTAMP ocsp END: Wed Mar 6 17:18:34 MST 2013 >Running tests for pkits >TIMESTAMP pkits BEGIN: Wed Mar 6 17:18:34 MST 2013 >pkits.sh: PKITS data directory not defined, skipping. >TIMESTAMP pkits END: Wed Mar 6 17:18:34 MST 2013 >Running tests for chains >TIMESTAMP chains BEGIN: Wed Mar 6 17:18:34 MST 2013 >httpserv starting at Wed Mar 6 17:18:34 MST 2013 >httpserv -D -p 9228 \ > -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/aiahttp/http_pid.17100 & >trying to connect to httpserv at Wed Mar 6 17:18:34 MST 2013 >tstclnt -p 9228 -h localhost.localdomain -q -v >tstclnt: connecting to localhost.localdomain:9228 (address=::1) >kill -0 2617 >/dev/null 2>/dev/null >httpserv with PID 2617 found at Wed Mar 6 17:18:34 MST 2013 >httpserv with PID 2617 started at Wed Mar 6 17:18:34 MST 2013 >chains.sh: Certificate Chains Tests =============================== >chains.sh: Creating DB ArmyDB >certutil -N -d ArmyDB -f ArmyDB/dbpasswd >chains.sh: #3360: Bridge: Creating DB ArmyDB - PASSED >chains.sh: Creating Root CA Army >certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171835 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3361: Bridge: Creating Root CA Army - PASSED >chains.sh: Exporting Root CA Army.der >certutil -L -d ArmyDB -r -n Army -o Army.der >chains.sh: #3362: Bridge: Exporting Root CA Army.der - PASSED >chains.sh: Creating DB NavyDB >certutil -N -d NavyDB -f NavyDB/dbpasswd >chains.sh: #3363: Bridge: Creating DB NavyDB - PASSED >chains.sh: Creating Root CA Navy >certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171836 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3364: Bridge: Creating Root CA Navy - PASSED >chains.sh: Exporting Root CA Navy.der >certutil -L -d NavyDB -r -n Navy -o Navy.der >chains.sh: #3365: Bridge: Exporting Root CA Navy.der - PASSED >chains.sh: Creating DB BridgeDB >certutil -N -d BridgeDB -f BridgeDB/dbpasswd >chains.sh: #3366: Bridge: Creating DB BridgeDB - PASSED >chains.sh: Creating Bridge certifiate request BridgeReq.der >certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3367: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED >chains.sh: Creating certficate BridgeArmy.der signed by Army >certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 306171837 -7 Bridge@Army < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3368: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED >chains.sh: Importing certificate BridgeArmy.der to BridgeDB database >certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der >chains.sh: #3369: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED >chains.sh: Creating certficate BridgeNavy.der signed by Navy >certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 306171838 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3370: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED >chains.sh: Importing certificate BridgeNavy.der to BridgeDB database >certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der >chains.sh: #3371: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED >chains.sh: Generating PKCS7 package from BridgeDB database >cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 >chains.sh: #3372: Bridge: Generating PKCS7 package from BridgeDB database - PASSED >chains.sh: Creating DB UserDB >certutil -N -d UserDB -f UserDB/dbpasswd >chains.sh: #3373: Bridge: Creating DB UserDB - PASSED >chains.sh: Creating EE certifiate request UserReq.der >certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3374: Bridge: Creating EE certifiate request UserReq.der - PASSED >chains.sh: Creating certficate UserBridge.der signed by Bridge >certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 306171839 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3375: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED >chains.sh: Importing certificate UserBridge.der to UserDB database >certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der >chains.sh: #3376: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #3377: Bridge: Creating DB AllDB - PASSED >chains.sh: Importing certificate Army.der to AllDB database >certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der >chains.sh: #3378: Bridge: Importing certificate Army.der to AllDB database - PASSED >chains.sh: Importing certificate Navy.der to AllDB database >certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der >chains.sh: #3379: Bridge: Importing certificate Navy.der to AllDB database - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy >vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171836 (0x123fcfbc) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:18:35 2013 > Not After : Wed Mar 07 00:18:35 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bc:18:56:0d:21:e7:43:e4:de:20:b0:64:5d:da:73:99: > 2c:c2:8d:4f:e4:ae:b7:fc:d1:07:02:c5:94:49:7d:89: > d5:9a:7e:cc:4d:40:5f:f4:dc:4d:fa:de:51:d8:d1:41: > f9:8d:79:c7:5a:66:49:e0:b8:91:fd:40:b1:2d:91:44: > 64:ac:69:38:08:08:18:d1:8c:6b:ec:63:15:e9:6e:8b: > a9:5c:d6:90:2f:40:33:ca:80:13:fe:c3:91:4d:e3:28: > 00:a2:71:a8:4b:72:aa:d9:fa:09:4f:92:f9:05:c6:6c: > a5:3a:90:85:1e:c1:aa:ed:19:31:b1:81:98:a5:e9:25 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 23:93:57:f3:bc:fd:30:22:c5:e3:f9:d1:51:0a:97:b1: > e1:7c:39:ef:ec:33:09:b7:ca:4e:c0:92:68:40:1a:56: > 58:3d:6a:d5:3e:2f:ff:30:40:79:77:98:66:e3:ab:75: > 66:08:6c:c7:0c:01:18:f6:2d:fe:55:bb:ef:71:46:9a: > ec:72:4a:3c:35:82:fa:13:dc:32:d1:1d:10:e8:b5:19: > 3b:b5:e1:4f:d0:58:8a:b7:6f:43:d5:d2:4b:69:04:c4: > 3d:85:7b:d7:cf:42:ab:3b:95:ff:04:76:8b:77:c2:9d: > ec:56:e2:9b:c7:15:b4:89:72:39:17:28:40:c0:fd:c9 > Fingerprint (MD5): > 25:30:CF:DA:D9:07:DF:7F:A6:32:D8:6F:23:B4:9F:98 > Fingerprint (SHA1): > 18:22:AD:23:6B:FA:22:B1:85:B0:41:2C:CF:3A:96:37:AE:33:3A:C8 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #3380: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army >vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171835 (0x123fcfbb) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Army ROOT CA,O=Army,C=US" > Validity: > Not Before: Thu Mar 07 00:18:35 2013 > Not After : Wed Mar 07 00:18:35 2063 > Subject: "CN=Army ROOT CA,O=Army,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:8d:bc:ed:18:58:cd:38:2d:49:e4:72:bf:20:b7:ac: > 0f:a6:94:84:ef:ec:ec:67:7a:8d:dd:37:db:65:af:fb: > 86:92:ae:09:46:00:cb:14:58:f2:3d:94:2e:c2:65:a6: > 9f:60:54:86:b9:e0:29:1f:b5:a6:67:04:e0:34:bd:42: > 1d:fb:75:39:3c:bc:50:59:2c:79:86:53:27:23:8f:52: > 4b:68:fe:43:4c:77:e5:ce:83:f3:97:c9:ca:14:bc:71: > 8a:12:ed:4a:c6:47:a3:fb:17:f2:f9:70:65:2d:96:9a: > 33:2b:ad:b7:38:0f:bd:93:e9:75:1d:35:28:a2:73:fb > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 14:11:7b:ea:65:99:42:dc:ee:46:eb:58:17:98:4a:30: > 9d:7a:f0:49:aa:08:81:61:37:e2:34:37:47:3b:37:3e: > 5e:24:b6:63:72:64:a2:52:d4:4b:87:6c:52:ca:12:f6: > 73:d9:66:1d:dc:ce:d0:cd:73:5c:c7:3d:49:0e:af:c0: > f8:fe:fe:d7:4e:ef:6e:b4:18:72:c8:ce:b8:0c:fe:5f: > 78:11:39:9e:83:01:7a:4d:21:66:95:16:52:64:76:45: > 77:36:de:a2:31:c0:fa:d2:4e:80:b0:12:91:79:e6:71: > 05:33:d6:90:a3:1f:7b:08:03:3c:f6:dd:0c:a4:42:5a > Fingerprint (MD5): > 1A:6B:67:8C:AE:EB:43:42:8A:2F:4C:69:17:99:A3:3A > Fingerprint (SHA1): > C7:DA:05:B3:F3:5F:51:36:85:23:AB:0F:3E:72:D9:21:14:84:00:FF > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #3381: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army >vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. Navy [Certificate Authority]: > ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. > CN=Navy ROOT CA,O=Navy,C=US >Returned value is 1, expected result is fail >chains.sh: #3382: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army - PASSED >chains.sh: Importing certificate BridgeArmy.der to AllDB database >certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der >chains.sh: #3383: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED >chains.sh: Importing certificate BridgeNavy.der to AllDB database >certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der >chains.sh: #3384: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED >chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army >vfychain -d AllDB -pp -vv UserBridge.der -t Army >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171835 (0x123fcfbb) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Army ROOT CA,O=Army,C=US" > Validity: > Not Before: Thu Mar 07 00:18:35 2013 > Not After : Wed Mar 07 00:18:35 2063 > Subject: "CN=Army ROOT CA,O=Army,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:8d:bc:ed:18:58:cd:38:2d:49:e4:72:bf:20:b7:ac: > 0f:a6:94:84:ef:ec:ec:67:7a:8d:dd:37:db:65:af:fb: > 86:92:ae:09:46:00:cb:14:58:f2:3d:94:2e:c2:65:a6: > 9f:60:54:86:b9:e0:29:1f:b5:a6:67:04:e0:34:bd:42: > 1d:fb:75:39:3c:bc:50:59:2c:79:86:53:27:23:8f:52: > 4b:68:fe:43:4c:77:e5:ce:83:f3:97:c9:ca:14:bc:71: > 8a:12:ed:4a:c6:47:a3:fb:17:f2:f9:70:65:2d:96:9a: > 33:2b:ad:b7:38:0f:bd:93:e9:75:1d:35:28:a2:73:fb > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 14:11:7b:ea:65:99:42:dc:ee:46:eb:58:17:98:4a:30: > 9d:7a:f0:49:aa:08:81:61:37:e2:34:37:47:3b:37:3e: > 5e:24:b6:63:72:64:a2:52:d4:4b:87:6c:52:ca:12:f6: > 73:d9:66:1d:dc:ce:d0:cd:73:5c:c7:3d:49:0e:af:c0: > f8:fe:fe:d7:4e:ef:6e:b4:18:72:c8:ce:b8:0c:fe:5f: > 78:11:39:9e:83:01:7a:4d:21:66:95:16:52:64:76:45: > 77:36:de:a2:31:c0:fa:d2:4e:80:b0:12:91:79:e6:71: > 05:33:d6:90:a3:1f:7b:08:03:3c:f6:dd:0c:a4:42:5a > Fingerprint (MD5): > 1A:6B:67:8C:AE:EB:43:42:8A:2F:4C:69:17:99:A3:3A > Fingerprint (SHA1): > C7:DA:05:B3:F3:5F:51:36:85:23:AB:0F:3E:72:D9:21:14:84:00:FF > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #3385: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army - PASSED >chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy >vfychain -d AllDB -pp -vv UserBridge.der -t Navy >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171836 (0x123fcfbc) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:18:35 2013 > Not After : Wed Mar 07 00:18:35 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bc:18:56:0d:21:e7:43:e4:de:20:b0:64:5d:da:73:99: > 2c:c2:8d:4f:e4:ae:b7:fc:d1:07:02:c5:94:49:7d:89: > d5:9a:7e:cc:4d:40:5f:f4:dc:4d:fa:de:51:d8:d1:41: > f9:8d:79:c7:5a:66:49:e0:b8:91:fd:40:b1:2d:91:44: > 64:ac:69:38:08:08:18:d1:8c:6b:ec:63:15:e9:6e:8b: > a9:5c:d6:90:2f:40:33:ca:80:13:fe:c3:91:4d:e3:28: > 00:a2:71:a8:4b:72:aa:d9:fa:09:4f:92:f9:05:c6:6c: > a5:3a:90:85:1e:c1:aa:ed:19:31:b1:81:98:a5:e9:25 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 23:93:57:f3:bc:fd:30:22:c5:e3:f9:d1:51:0a:97:b1: > e1:7c:39:ef:ec:33:09:b7:ca:4e:c0:92:68:40:1a:56: > 58:3d:6a:d5:3e:2f:ff:30:40:79:77:98:66:e3:ab:75: > 66:08:6c:c7:0c:01:18:f6:2d:fe:55:bb:ef:71:46:9a: > ec:72:4a:3c:35:82:fa:13:dc:32:d1:1d:10:e8:b5:19: > 3b:b5:e1:4f:d0:58:8a:b7:6f:43:d5:d2:4b:69:04:c4: > 3d:85:7b:d7:cf:42:ab:3b:95:ff:04:76:8b:77:c2:9d: > ec:56:e2:9b:c7:15:b4:89:72:39:17:28:40:c0:fd:c9 > Fingerprint (MD5): > 25:30:CF:DA:D9:07:DF:7F:A6:32:D8:6F:23:B4:9F:98 > Fingerprint (SHA1): > 18:22:AD:23:6B:FA:22:B1:85:B0:41:2C:CF:3A:96:37:AE:33:3A:C8 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #3386: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy - PASSED >chains.sh: Creating DB ArmyOnlyDB >certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd >chains.sh: #3387: Bridge: Creating DB ArmyOnlyDB - PASSED >chains.sh: Importing certificate Army.der to ArmyOnlyDB database >certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der >chains.sh: #3388: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED >chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB >vfychain -d ArmyOnlyDB -pp -vv UserBridge.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 0. CN=User EE,O=User,C=US : > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Bridge Bridge,O=Bridge,C=US >Returned value is 1, expected result is fail >chains.sh: #3389: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB >vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. bridge@navy [Certificate Authority]: >Email Address(es): bridge@navy > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Navy ROOT CA,O=Navy,C=US >Returned value is 1, expected result is fail >chains.sh: #3390: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB >vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: > ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. > CN=Navy ROOT CA,O=Navy,C=US >Returned value is 1, expected result is fail >chains.sh: #3391: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der >vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171836 (0x123fcfbc) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:18:35 2013 > Not After : Wed Mar 07 00:18:35 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bc:18:56:0d:21:e7:43:e4:de:20:b0:64:5d:da:73:99: > 2c:c2:8d:4f:e4:ae:b7:fc:d1:07:02:c5:94:49:7d:89: > d5:9a:7e:cc:4d:40:5f:f4:dc:4d:fa:de:51:d8:d1:41: > f9:8d:79:c7:5a:66:49:e0:b8:91:fd:40:b1:2d:91:44: > 64:ac:69:38:08:08:18:d1:8c:6b:ec:63:15:e9:6e:8b: > a9:5c:d6:90:2f:40:33:ca:80:13:fe:c3:91:4d:e3:28: > 00:a2:71:a8:4b:72:aa:d9:fa:09:4f:92:f9:05:c6:6c: > a5:3a:90:85:1e:c1:aa:ed:19:31:b1:81:98:a5:e9:25 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 23:93:57:f3:bc:fd:30:22:c5:e3:f9:d1:51:0a:97:b1: > e1:7c:39:ef:ec:33:09:b7:ca:4e:c0:92:68:40:1a:56: > 58:3d:6a:d5:3e:2f:ff:30:40:79:77:98:66:e3:ab:75: > 66:08:6c:c7:0c:01:18:f6:2d:fe:55:bb:ef:71:46:9a: > ec:72:4a:3c:35:82:fa:13:dc:32:d1:1d:10:e8:b5:19: > 3b:b5:e1:4f:d0:58:8a:b7:6f:43:d5:d2:4b:69:04:c4: > 3d:85:7b:d7:cf:42:ab:3b:95:ff:04:76:8b:77:c2:9d: > ec:56:e2:9b:c7:15:b4:89:72:39:17:28:40:c0:fd:c9 > Fingerprint (MD5): > 25:30:CF:DA:D9:07:DF:7F:A6:32:D8:6F:23:B4:9F:98 > Fingerprint (SHA1): > 18:22:AD:23:6B:FA:22:B1:85:B0:41:2C:CF:3A:96:37:AE:33:3A:C8 >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #3392: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der >vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171836 (0x123fcfbc) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:18:35 2013 > Not After : Wed Mar 07 00:18:35 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bc:18:56:0d:21:e7:43:e4:de:20:b0:64:5d:da:73:99: > 2c:c2:8d:4f:e4:ae:b7:fc:d1:07:02:c5:94:49:7d:89: > d5:9a:7e:cc:4d:40:5f:f4:dc:4d:fa:de:51:d8:d1:41: > f9:8d:79:c7:5a:66:49:e0:b8:91:fd:40:b1:2d:91:44: > 64:ac:69:38:08:08:18:d1:8c:6b:ec:63:15:e9:6e:8b: > a9:5c:d6:90:2f:40:33:ca:80:13:fe:c3:91:4d:e3:28: > 00:a2:71:a8:4b:72:aa:d9:fa:09:4f:92:f9:05:c6:6c: > a5:3a:90:85:1e:c1:aa:ed:19:31:b1:81:98:a5:e9:25 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 23:93:57:f3:bc:fd:30:22:c5:e3:f9:d1:51:0a:97:b1: > e1:7c:39:ef:ec:33:09:b7:ca:4e:c0:92:68:40:1a:56: > 58:3d:6a:d5:3e:2f:ff:30:40:79:77:98:66:e3:ab:75: > 66:08:6c:c7:0c:01:18:f6:2d:fe:55:bb:ef:71:46:9a: > ec:72:4a:3c:35:82:fa:13:dc:32:d1:1d:10:e8:b5:19: > 3b:b5:e1:4f:d0:58:8a:b7:6f:43:d5:d2:4b:69:04:c4: > 3d:85:7b:d7:cf:42:ab:3b:95:ff:04:76:8b:77:c2:9d: > ec:56:e2:9b:c7:15:b4:89:72:39:17:28:40:c0:fd:c9 > Fingerprint (MD5): > 25:30:CF:DA:D9:07:DF:7F:A6:32:D8:6F:23:B4:9F:98 > Fingerprint (SHA1): > 18:22:AD:23:6B:FA:22:B1:85:B0:41:2C:CF:3A:96:37:AE:33:3A:C8 >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #3393: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED >chains.sh: Creating DB NavyOnlyDB >certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd >chains.sh: #3394: Bridge: Creating DB NavyOnlyDB - PASSED >chains.sh: Importing certificate Navy.der to NavyOnlyDB database >certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der >chains.sh: #3395: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED >chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB >vfychain -d NavyOnlyDB -pp -vv UserBridge.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 0. CN=User EE,O=User,C=US : > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Bridge Bridge,O=Bridge,C=US >Returned value is 1, expected result is fail >chains.sh: #3396: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB >vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. bridge@army [Certificate Authority]: >Email Address(es): bridge@army > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Army ROOT CA,O=Army,C=US >Returned value is 1, expected result is fail >chains.sh: #3397: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB >vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: > ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. > CN=Army ROOT CA,O=Army,C=US >Returned value is 1, expected result is fail >chains.sh: #3398: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der >vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171835 (0x123fcfbb) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Army ROOT CA,O=Army,C=US" > Validity: > Not Before: Thu Mar 07 00:18:35 2013 > Not After : Wed Mar 07 00:18:35 2063 > Subject: "CN=Army ROOT CA,O=Army,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:8d:bc:ed:18:58:cd:38:2d:49:e4:72:bf:20:b7:ac: > 0f:a6:94:84:ef:ec:ec:67:7a:8d:dd:37:db:65:af:fb: > 86:92:ae:09:46:00:cb:14:58:f2:3d:94:2e:c2:65:a6: > 9f:60:54:86:b9:e0:29:1f:b5:a6:67:04:e0:34:bd:42: > 1d:fb:75:39:3c:bc:50:59:2c:79:86:53:27:23:8f:52: > 4b:68:fe:43:4c:77:e5:ce:83:f3:97:c9:ca:14:bc:71: > 8a:12:ed:4a:c6:47:a3:fb:17:f2:f9:70:65:2d:96:9a: > 33:2b:ad:b7:38:0f:bd:93:e9:75:1d:35:28:a2:73:fb > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 14:11:7b:ea:65:99:42:dc:ee:46:eb:58:17:98:4a:30: > 9d:7a:f0:49:aa:08:81:61:37:e2:34:37:47:3b:37:3e: > 5e:24:b6:63:72:64:a2:52:d4:4b:87:6c:52:ca:12:f6: > 73:d9:66:1d:dc:ce:d0:cd:73:5c:c7:3d:49:0e:af:c0: > f8:fe:fe:d7:4e:ef:6e:b4:18:72:c8:ce:b8:0c:fe:5f: > 78:11:39:9e:83:01:7a:4d:21:66:95:16:52:64:76:45: > 77:36:de:a2:31:c0:fa:d2:4e:80:b0:12:91:79:e6:71: > 05:33:d6:90:a3:1f:7b:08:03:3c:f6:dd:0c:a4:42:5a > Fingerprint (MD5): > 1A:6B:67:8C:AE:EB:43:42:8A:2F:4C:69:17:99:A3:3A > Fingerprint (SHA1): > C7:DA:05:B3:F3:5F:51:36:85:23:AB:0F:3E:72:D9:21:14:84:00:FF >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #3399: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der - PASSED >chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der >vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171835 (0x123fcfbb) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Army ROOT CA,O=Army,C=US" > Validity: > Not Before: Thu Mar 07 00:18:35 2013 > Not After : Wed Mar 07 00:18:35 2063 > Subject: "CN=Army ROOT CA,O=Army,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:8d:bc:ed:18:58:cd:38:2d:49:e4:72:bf:20:b7:ac: > 0f:a6:94:84:ef:ec:ec:67:7a:8d:dd:37:db:65:af:fb: > 86:92:ae:09:46:00:cb:14:58:f2:3d:94:2e:c2:65:a6: > 9f:60:54:86:b9:e0:29:1f:b5:a6:67:04:e0:34:bd:42: > 1d:fb:75:39:3c:bc:50:59:2c:79:86:53:27:23:8f:52: > 4b:68:fe:43:4c:77:e5:ce:83:f3:97:c9:ca:14:bc:71: > 8a:12:ed:4a:c6:47:a3:fb:17:f2:f9:70:65:2d:96:9a: > 33:2b:ad:b7:38:0f:bd:93:e9:75:1d:35:28:a2:73:fb > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 14:11:7b:ea:65:99:42:dc:ee:46:eb:58:17:98:4a:30: > 9d:7a:f0:49:aa:08:81:61:37:e2:34:37:47:3b:37:3e: > 5e:24:b6:63:72:64:a2:52:d4:4b:87:6c:52:ca:12:f6: > 73:d9:66:1d:dc:ce:d0:cd:73:5c:c7:3d:49:0e:af:c0: > f8:fe:fe:d7:4e:ef:6e:b4:18:72:c8:ce:b8:0c:fe:5f: > 78:11:39:9e:83:01:7a:4d:21:66:95:16:52:64:76:45: > 77:36:de:a2:31:c0:fa:d2:4e:80:b0:12:91:79:e6:71: > 05:33:d6:90:a3:1f:7b:08:03:3c:f6:dd:0c:a4:42:5a > Fingerprint (MD5): > 1A:6B:67:8C:AE:EB:43:42:8A:2F:4C:69:17:99:A3:3A > Fingerprint (SHA1): > C7:DA:05:B3:F3:5F:51:36:85:23:AB:0F:3E:72:D9:21:14:84:00:FF >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #3400: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der - PASSED >chains.sh: Creating DB Root1DB >certutil -N -d Root1DB -f Root1DB/dbpasswd >chains.sh: #3401: MegaBridge_3_2: Creating DB Root1DB - PASSED >chains.sh: Creating Root CA Root1 >certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171840 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3402: MegaBridge_3_2: Creating Root CA Root1 - PASSED >chains.sh: Exporting Root CA Root1.der >certutil -L -d Root1DB -r -n Root1 -o Root1.der >chains.sh: #3403: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED >chains.sh: Creating DB Root2DB >certutil -N -d Root2DB -f Root2DB/dbpasswd >chains.sh: #3404: MegaBridge_3_2: Creating DB Root2DB - PASSED >chains.sh: Creating Root CA Root2 >certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171841 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3405: MegaBridge_3_2: Creating Root CA Root2 - PASSED >chains.sh: Exporting Root CA Root2.der >certutil -L -d Root2DB -r -n Root2 -o Root2.der >chains.sh: #3406: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED >chains.sh: Creating DB Root3DB >certutil -N -d Root3DB -f Root3DB/dbpasswd >chains.sh: #3407: MegaBridge_3_2: Creating DB Root3DB - PASSED >chains.sh: Creating Root CA Root3 >certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171842 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3408: MegaBridge_3_2: Creating Root CA Root3 - PASSED >chains.sh: Exporting Root CA Root3.der >certutil -L -d Root3DB -r -n Root3 -o Root3.der >chains.sh: #3409: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED >chains.sh: Creating DB Root4DB >certutil -N -d Root4DB -f Root4DB/dbpasswd >chains.sh: #3410: MegaBridge_3_2: Creating DB Root4DB - PASSED >chains.sh: Creating Root CA Root4 >certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171843 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3411: MegaBridge_3_2: Creating Root CA Root4 - PASSED >chains.sh: Exporting Root CA Root4.der >certutil -L -d Root4DB -r -n Root4 -o Root4.der >chains.sh: #3412: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED >chains.sh: Creating DB Root5DB >certutil -N -d Root5DB -f Root5DB/dbpasswd >chains.sh: #3413: MegaBridge_3_2: Creating DB Root5DB - PASSED >chains.sh: Creating Root CA Root5 >certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171844 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3414: MegaBridge_3_2: Creating Root CA Root5 - PASSED >chains.sh: Exporting Root CA Root5.der >certutil -L -d Root5DB -r -n Root5 -o Root5.der >chains.sh: #3415: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED >chains.sh: Creating DB Root6DB >certutil -N -d Root6DB -f Root6DB/dbpasswd >chains.sh: #3416: MegaBridge_3_2: Creating DB Root6DB - PASSED >chains.sh: Creating Root CA Root6 >certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171845 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3417: MegaBridge_3_2: Creating Root CA Root6 - PASSED >chains.sh: Exporting Root CA Root6.der >certutil -L -d Root6DB -r -n Root6 -o Root6.der >chains.sh: #3418: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED >chains.sh: Creating DB Root7DB >certutil -N -d Root7DB -f Root7DB/dbpasswd >chains.sh: #3419: MegaBridge_3_2: Creating DB Root7DB - PASSED >chains.sh: Creating Root CA Root7 >certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171846 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3420: MegaBridge_3_2: Creating Root CA Root7 - PASSED >chains.sh: Exporting Root CA Root7.der >certutil -L -d Root7DB -r -n Root7 -o Root7.der >chains.sh: #3421: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED >chains.sh: Creating DB Root8DB >certutil -N -d Root8DB -f Root8DB/dbpasswd >chains.sh: #3422: MegaBridge_3_2: Creating DB Root8DB - PASSED >chains.sh: Creating Root CA Root8 >certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171847 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3423: MegaBridge_3_2: Creating Root CA Root8 - PASSED >chains.sh: Exporting Root CA Root8.der >certutil -L -d Root8DB -r -n Root8 -o Root8.der >chains.sh: #3424: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED >chains.sh: Creating DB Root9DB >certutil -N -d Root9DB -f Root9DB/dbpasswd >chains.sh: #3425: MegaBridge_3_2: Creating DB Root9DB - PASSED >chains.sh: Creating Root CA Root9 >certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171848 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3426: MegaBridge_3_2: Creating Root CA Root9 - PASSED >chains.sh: Exporting Root CA Root9.der >certutil -L -d Root9DB -r -n Root9 -o Root9.der >chains.sh: #3427: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED >chains.sh: Creating DB Bridge11DB >certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd >chains.sh: #3428: MegaBridge_3_2: Creating DB Bridge11DB - PASSED >chains.sh: Creating Bridge certifiate request Bridge11Req.der >certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3429: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED >chains.sh: Creating certficate Bridge11Root1.der signed by Root1 >certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 306171849 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3430: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED >chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database >certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der >chains.sh: #3431: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED >chains.sh: Creating certficate Bridge11Root2.der signed by Root2 >certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 306171850 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3432: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED >chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database >certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der >chains.sh: #3433: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED >chains.sh: Creating certficate Bridge11Root3.der signed by Root3 >certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 306171851 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3434: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED >chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database >certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der >chains.sh: #3435: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED >chains.sh: Generating PKCS7 package from Bridge11DB database >cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 >chains.sh: #3436: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED >chains.sh: Creating DB Bridge12DB >certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd >chains.sh: #3437: MegaBridge_3_2: Creating DB Bridge12DB - PASSED >chains.sh: Creating Bridge certifiate request Bridge12Req.der >certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3438: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED >chains.sh: Creating certficate Bridge12Root4.der signed by Root4 >certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 306171852 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3439: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED >chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database >certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der >chains.sh: #3440: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED >chains.sh: Creating certficate Bridge12Root5.der signed by Root5 >certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 306171853 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3441: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED >chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database >certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der >chains.sh: #3442: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED >chains.sh: Creating certficate Bridge12Root6.der signed by Root6 >certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 306171854 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3443: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED >chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database >certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der >chains.sh: #3444: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED >chains.sh: Generating PKCS7 package from Bridge12DB database >cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 >chains.sh: #3445: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED >chains.sh: Creating DB Bridge13DB >certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd >chains.sh: #3446: MegaBridge_3_2: Creating DB Bridge13DB - PASSED >chains.sh: Creating Bridge certifiate request Bridge13Req.der >certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3447: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED >chains.sh: Creating certficate Bridge13Root7.der signed by Root7 >certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 306171855 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3448: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED >chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database >certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der >chains.sh: #3449: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED >chains.sh: Creating certficate Bridge13Root8.der signed by Root8 >certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 306171856 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3450: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED >chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database >certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der >chains.sh: #3451: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED >chains.sh: Creating certficate Bridge13Root9.der signed by Root9 >certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 306171857 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3452: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED >chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database >certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der >chains.sh: #3453: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED >chains.sh: Generating PKCS7 package from Bridge13DB database >cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 >chains.sh: #3454: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED >chains.sh: Creating DB Bridge21DB >certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd >chains.sh: #3455: MegaBridge_3_2: Creating DB Bridge21DB - PASSED >chains.sh: Creating Bridge certifiate request Bridge21Req.der >certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3456: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED >chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 >certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 306171858 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3457: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED >chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database >certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der >chains.sh: #3458: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED >chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 >certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 306171859 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3459: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED >chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database >certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der >chains.sh: #3460: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED >chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 >certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 306171860 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3461: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED >chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database >certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der >chains.sh: #3462: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED >chains.sh: Generating PKCS7 package from Bridge21DB database >cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 >chains.sh: #3463: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #3464: MegaBridge_3_2: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3465: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 >certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 306171861 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3466: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED >chains.sh: Importing certificate CA1Bridge21.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der >chains.sh: #3467: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED >chains.sh: Creating DB EE1DB >certutil -N -d EE1DB -f EE1DB/dbpasswd >chains.sh: #3468: MegaBridge_3_2: Creating DB EE1DB - PASSED >chains.sh: Creating EE certifiate request EE1Req.der >certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3469: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED >chains.sh: Creating certficate EE1CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 306171862 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3470: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate EE1CA1.der to EE1DB database >certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der >chains.sh: #3471: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171840 (0x123fcfc0) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" > Validity: > Not Before: Thu Mar 07 00:18:36 2013 > Not After : Wed Mar 07 00:18:36 2063 > Subject: "CN=Root1 ROOT CA,O=Root1,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:a9:10:7a:bc:9b:8c:80:06:83:e4:f0:5a:00:67:ea: > be:a2:7c:a0:52:63:57:9b:1f:29:f9:d3:8d:ef:d5:3f: > 96:0d:80:92:77:e9:3c:d0:32:e0:7c:c9:93:2e:88:10: > 68:39:7d:52:c9:1a:a0:57:31:47:6c:95:7a:c1:d2:0d: > 7c:b0:ec:27:e0:ab:8e:9d:20:ac:a3:95:53:4b:80:f9: > a0:95:7d:e4:20:2d:cd:c1:83:23:73:81:24:9d:75:15: > bf:82:07:de:b0:63:44:55:b0:6e:8b:16:2e:9d:95:ea: > b7:b0:0a:f8:06:8f:6e:d7:69:a6:60:4d:8f:94:e4:8d > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > b6:d5:77:1d:d4:61:ad:1c:4d:f6:d9:1f:8a:52:d6:4d: > 4e:1d:1b:35:46:af:6a:cc:1b:e8:79:e0:87:ad:c8:96: > 0b:ac:31:11:7b:60:c7:7f:dd:10:99:8c:67:ac:97:2f: > da:66:9e:df:1f:92:e9:08:11:90:40:94:db:41:eb:96: > e3:46:68:6f:ec:9c:e7:29:d7:d2:56:ce:ea:ef:c0:5b: > ef:28:71:93:c9:39:1e:80:dc:c1:a1:71:ce:ef:80:5b: > 5c:49:64:af:f3:af:0f:ba:73:5d:df:ca:16:a3:3d:08: > d3:4b:c2:d8:bc:73:f8:99:af:72:20:b0:07:c8:0e:55 > Fingerprint (MD5): > 0A:C2:58:1E:05:36:F6:B4:CC:AC:E6:55:49:B7:D8:C3 > Fingerprint (SHA1): > 0C:3B:BA:AD:52:D5:43:3B:9A:A5:68:90:BD:09:C8:01:6E:D0:37:A2 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" >Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" >Returned value is 0, expected result is pass >chains.sh: #3472: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171841 (0x123fcfc1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" > Validity: > Not Before: Thu Mar 07 00:18:37 2013 > Not After : Wed Mar 07 00:18:37 2063 > Subject: "CN=Root2 ROOT CA,O=Root2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bf:3a:8b:9e:63:65:35:7b:ef:1e:fe:62:fe:c3:8f:05: > 5a:97:30:92:9e:0c:2e:9a:3c:9f:6e:54:4a:c4:cb:d1: > 9c:3c:e5:94:5e:0d:72:ec:b9:b7:f2:82:3a:b0:2f:5f: > a2:ee:56:71:fe:86:40:24:9d:5f:3c:28:3b:90:b0:f3: > bf:f5:5f:f2:16:d2:72:01:d0:32:87:ff:c0:ac:8f:4a: > 7d:f1:4b:1f:63:11:4d:82:ca:26:fc:0e:37:66:c3:2c: > 44:a6:b6:83:1c:bd:8a:b5:22:4e:93:8b:df:1b:43:12: > 73:b0:0b:1a:f1:a3:2d:37:d2:e2:1a:2d:54:0c:7a:bf > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 40:7e:a4:7e:09:d6:6b:0a:ce:a7:66:49:e3:f4:0e:83: > 37:aa:cb:19:6b:2d:d4:5b:20:5a:64:97:71:81:38:ae: > a9:8b:2c:60:3e:e8:fd:10:17:03:f2:9e:f4:69:ab:ff: > 60:19:07:e9:65:f4:e4:ec:9c:c0:70:f1:f0:99:7e:78: > 1a:73:f0:0f:d7:dd:ad:40:6e:04:f5:0c:82:74:e4:7a: > 17:2e:2f:04:5f:85:63:0f:87:7d:fe:24:1d:56:0e:c1: > 3f:ac:5c:ad:89:84:93:6e:27:53:f0:5b:fd:53:d8:b1: > 87:e2:73:fe:94:ba:25:5e:5d:8a:b6:67:e9:5e:92:22 > Fingerprint (MD5): > 26:77:C1:9D:11:F5:61:92:04:88:EB:8D:BB:8A:03:D0 > Fingerprint (SHA1): > 02:80:5C:5D:8C:20:8D:1A:CD:54:A4:4B:3A:B0:3E:FB:16:E9:DC:C1 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" >Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" >Returned value is 0, expected result is pass >chains.sh: #3473: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171842 (0x123fcfc2) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" > Validity: > Not Before: Thu Mar 07 00:18:37 2013 > Not After : Wed Mar 07 00:18:37 2063 > Subject: "CN=Root3 ROOT CA,O=Root3,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b4:ae:2b:fa:89:32:58:2e:39:08:84:c8:46:f0:e0:95: > b1:50:55:cb:7f:dd:6c:99:c4:b4:ea:1d:22:eb:0b:93: > aa:65:13:8f:1e:4a:e7:e0:09:81:5a:cc:d6:8f:c2:6d: > e1:00:df:55:4e:96:c0:de:be:22:aa:e7:8b:43:c5:44: > 91:06:11:95:46:a3:d1:04:20:07:95:17:d7:b5:b5:d6: > 85:ef:5b:b9:c9:59:55:30:44:ed:65:5f:8d:10:48:2c: > b2:c6:73:5f:26:36:fc:28:e4:54:c2:75:ca:c1:02:45: > 8d:0a:d5:39:10:b8:f1:e6:f5:c5:c4:12:c1:3e:54:3b > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 3c:ff:b6:f9:5c:bb:6c:aa:12:eb:49:b9:4e:fa:68:41: > 70:41:ed:ac:73:63:4f:18:e3:93:55:07:f1:72:18:25: > f6:bd:8d:94:6a:6f:45:05:cb:55:79:52:8e:45:50:b7: > e6:b8:c9:70:41:79:ce:08:b7:b1:51:b0:dc:bd:c0:7f: > f1:f7:46:3e:3b:f0:01:9b:da:b8:b1:68:46:ea:d4:ac: > 1e:61:2f:b7:ee:f5:3c:84:9d:46:46:a2:ca:38:d7:9d: > 12:0c:3b:07:b7:f2:b0:93:e6:1e:7c:89:d5:58:e4:ae: > 82:ec:61:25:4e:d1:69:a6:06:81:2f:5e:38:da:b2:ad > Fingerprint (MD5): > 63:26:68:84:9E:25:31:62:39:A3:B2:27:DB:0B:4A:81 > Fingerprint (SHA1): > 77:97:9D:62:7A:F8:1E:2F:1A:91:42:16:2D:30:D9:01:1B:9C:FF:A6 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" >Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" >Returned value is 0, expected result is pass >chains.sh: #3474: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171843 (0x123fcfc3) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" > Validity: > Not Before: Thu Mar 07 00:18:37 2013 > Not After : Wed Mar 07 00:18:37 2063 > Subject: "CN=Root4 ROOT CA,O=Root4,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > cf:1d:1a:0c:5d:69:f4:c3:56:4d:c1:17:04:34:61:92: > 3e:9c:e3:3c:7f:10:73:ec:6b:b8:e7:8a:f8:9e:e3:0a: > 62:27:85:ba:86:88:cc:03:bb:f8:73:c8:a1:c6:7c:0d: > 02:4a:7b:63:e3:f0:b7:e8:6b:12:d8:6b:0f:a8:9c:97: > 3d:ee:3d:79:d9:48:d8:4b:0f:c9:ed:a0:31:2e:e7:4a: > bc:89:c7:e5:e6:db:3d:4f:84:61:8d:62:2f:d6:eb:5f: > c3:35:27:03:ce:27:96:4f:4d:aa:a2:39:d9:70:c2:ef: > 18:da:2d:51:5d:c3:ee:d9:e3:8f:35:db:96:cb:72:cb > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > a7:48:db:a3:f1:88:53:fd:a1:5e:d4:b1:fa:5a:cb:18: > 48:32:09:61:da:37:ac:6e:10:d6:62:1d:be:e6:d5:80: > 41:cf:a4:fe:c5:47:9b:e7:88:94:6b:23:ec:43:de:ec: > 12:49:c2:9a:e5:92:23:f6:4c:e9:69:20:e1:96:80:95: > ec:17:83:94:47:b8:76:49:b2:12:31:78:c8:5e:fe:17: > 96:fc:fc:47:84:b7:b5:39:4f:5a:4f:3c:d0:45:eb:22: > d4:d2:5e:02:e6:73:ce:4c:c1:a5:5c:54:ba:07:cd:28: > 2f:c9:f2:25:74:b0:37:b6:e6:5a:b0:70:d2:ad:6b:97 > Fingerprint (MD5): > 2D:C0:96:3D:C2:A4:90:E2:B6:94:66:D2:A1:F7:FA:B0 > Fingerprint (SHA1): > A7:2E:1D:FC:8A:8C:CD:5D:E1:7C:C1:D8:7A:F6:3F:E2:62:4E:9B:54 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" >Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" >Returned value is 0, expected result is pass >chains.sh: #3475: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171844 (0x123fcfc4) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" > Validity: > Not Before: Thu Mar 07 00:18:37 2013 > Not After : Wed Mar 07 00:18:37 2063 > Subject: "CN=Root5 ROOT CA,O=Root5,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ad:01:ff:15:55:a2:85:77:4b:b8:16:4c:45:72:9c:55: > fd:f2:9c:b6:15:64:cc:72:9b:9c:bb:7f:77:f2:2e:0c: > 9d:9a:be:4b:5d:a0:ec:b8:01:03:d7:00:14:76:66:bb: > 92:fe:89:a2:7b:fb:6c:51:e6:3f:00:dd:92:a4:a8:60: > 2d:70:e3:45:83:ff:93:e1:5a:aa:e3:7f:28:52:24:fa: > 42:18:52:c0:82:7f:46:54:b9:c5:b1:8e:27:2e:56:57: > a6:87:80:e4:2c:b7:89:49:bd:6b:e9:56:ed:5d:3e:13: > 31:56:b5:0e:30:d1:fa:f8:fb:de:8e:a7:94:8d:57:87 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 35:48:f9:f0:88:78:37:46:b1:22:81:c3:c1:3c:59:9f: > a2:81:16:33:d1:0b:e0:1a:41:99:20:d6:85:16:87:9a: > 9b:4c:5e:03:62:21:46:94:a4:11:a7:e7:20:1b:44:84: > 9e:cb:9f:f0:94:76:7a:1b:50:81:0a:41:70:82:18:97: > ab:7f:f1:d3:41:93:86:79:30:20:b8:5e:17:74:24:e3: > 42:65:36:49:e0:f7:7c:20:01:80:29:86:20:00:2f:52: > aa:af:e2:ed:8b:8e:78:7a:57:af:c3:d0:8e:dc:3e:b1: > 2a:f4:5d:27:25:46:49:96:95:9e:3b:5e:36:43:88:f8 > Fingerprint (MD5): > A7:4F:B5:96:90:EB:92:FA:B8:9A:E5:56:6F:21:9F:6A > Fingerprint (SHA1): > E7:70:6B:BB:6C:63:42:B8:83:F7:97:3E:0D:60:24:EC:4F:B8:0C:9D >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" >Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" >Returned value is 0, expected result is pass >chains.sh: #3476: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171845 (0x123fcfc5) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" > Validity: > Not Before: Thu Mar 07 00:18:37 2013 > Not After : Wed Mar 07 00:18:37 2063 > Subject: "CN=Root6 ROOT CA,O=Root6,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > cf:26:1b:ca:56:a9:e4:65:88:0f:a0:ef:45:f3:0f:27: > 5c:2c:c0:81:ec:db:06:dd:a9:24:e4:7b:cd:74:9c:e5: > 63:34:7e:a2:0a:1b:dd:de:67:14:36:4a:a6:0c:94:9b: > 3c:a4:ac:af:0f:8d:e5:b7:c9:ba:3b:c6:6a:8d:b9:80: > 80:e2:47:77:2e:b3:e9:e3:1e:b6:ea:35:7f:a4:f6:6c: > 95:27:c1:03:3b:25:46:d5:3f:ff:a5:f7:f8:8f:67:4a: > ee:2b:cb:da:08:1b:65:2b:ef:a4:af:b8:18:fe:5f:0a: > c4:ca:63:3a:95:cb:d5:a4:45:61:c0:7d:4d:ea:86:51 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 86:e3:af:36:d7:60:9b:45:9d:24:e8:cb:8f:bd:27:84: > 91:23:7f:d8:dc:32:71:12:ec:5e:9b:50:0a:55:12:d3: > d7:08:94:c6:ef:dc:48:25:c6:66:e6:b3:56:9a:6b:c9: > 12:16:a0:34:d2:82:95:de:3d:e4:56:4c:6c:48:65:da: > 82:24:18:2e:84:c8:d6:11:e4:f0:1a:3f:02:05:8f:cd: > ec:02:2f:7c:7f:4d:8d:ce:05:8c:36:95:e1:4e:9f:bf: > ad:d3:8c:14:22:5d:a8:04:f1:5c:c9:9e:e1:74:6c:67: > 3e:1b:fc:d8:ae:27:6b:39:02:1f:c1:30:b7:4d:0a:3f > Fingerprint (MD5): > A8:31:0F:9F:92:18:AF:D8:A9:86:4B:AF:0F:5D:E5:2C > Fingerprint (SHA1): > 8A:C3:6B:65:DA:49:FF:EF:87:D9:30:1D:F3:A6:F3:17:D9:6B:34:99 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" >Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" >Returned value is 0, expected result is pass >chains.sh: #3477: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171846 (0x123fcfc6) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" > Validity: > Not Before: Thu Mar 07 00:18:38 2013 > Not After : Wed Mar 07 00:18:38 2063 > Subject: "CN=Root7 ROOT CA,O=Root7,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b8:b5:a6:ea:0c:e7:33:a9:3b:1a:f7:bb:7c:eb:72:5c: > 72:2a:53:ff:da:72:b4:61:b7:25:3d:43:98:ed:83:f6: > 90:0a:ba:67:4b:75:53:00:6a:a2:17:96:2c:7d:61:fd: > 2f:d8:2d:7b:5b:38:7d:59:14:97:96:9d:58:cd:bb:7f: > 81:83:a3:9f:7d:dc:8b:f5:25:c7:74:a2:6e:59:7d:6e: > a4:2d:94:c2:3d:ca:97:8b:94:15:d7:3f:ec:c0:1f:e9: > a9:99:59:b4:cd:37:31:7b:0d:bc:a8:18:5b:53:d1:1d: > 0d:9d:cb:e8:11:92:74:56:56:f0:8c:14:a9:da:67:03 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 47:48:99:7c:ad:10:76:ce:8d:49:7f:f5:6e:79:44:b2: > 8f:14:a6:6b:3a:35:64:40:4a:3a:9e:a2:99:63:8c:f3: > d7:85:bd:23:58:21:4d:c0:a7:b8:ff:3d:2f:09:f6:ee: > f8:a4:e1:d5:de:f4:f2:a2:e9:a1:be:70:a9:fa:d9:48: > f4:70:84:2a:f8:69:8d:20:17:6b:30:f9:15:02:22:14: > 7c:3a:3a:4f:b8:02:5c:e5:bf:99:e0:fe:6c:78:78:c4: > 25:9f:29:81:31:c6:94:05:f1:f6:0f:c1:45:54:74:69: > 25:88:25:79:a2:75:cf:cf:c9:f7:fb:f0:60:b0:1a:96 > Fingerprint (MD5): > 1A:25:97:8B:D4:BA:FE:C0:C0:EC:1B:7A:87:69:83:47 > Fingerprint (SHA1): > FA:A2:6D:DF:F0:A6:13:CA:25:78:25:5C:B6:3F:AF:4C:5F:1E:C1:00 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" >Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" >Returned value is 0, expected result is pass >chains.sh: #3478: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171847 (0x123fcfc7) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" > Validity: > Not Before: Thu Mar 07 00:18:38 2013 > Not After : Wed Mar 07 00:18:38 2063 > Subject: "CN=Root8 ROOT CA,O=Root8,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:f3:fb:03:9d:95:ef:81:da:d0:5c:64:5b:cf:1b:09: > 4f:51:a7:8e:69:46:ed:2a:65:54:b2:e6:23:b2:23:ce: > ba:1f:38:01:fc:69:ab:03:30:74:9a:02:6e:d4:07:6b: > 59:31:e6:92:3a:b9:77:27:49:82:fd:3e:5a:46:a7:c3: > a1:3d:65:c3:63:65:39:f0:5a:d0:6b:84:c3:44:57:5a: > 0c:c9:30:bc:dd:87:d3:fa:c8:74:c9:a8:c3:ca:a1:24: > b7:90:ff:fe:05:80:c0:b3:4e:3a:33:81:26:8d:af:9c: > c9:17:81:af:92:2f:d2:bc:81:d2:b3:a9:e8:5a:98:f5 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 8a:5a:28:a2:ba:61:9b:91:59:59:98:1f:2a:17:a8:98: > 94:e7:bf:8f:08:74:57:ec:81:fe:ce:f7:41:fd:28:f7: > af:61:5c:4c:21:eb:c3:3a:c0:12:ca:61:bb:21:4c:64: > ef:ba:d4:03:1d:94:e7:91:45:53:dd:bd:b5:28:82:c7: > 1d:f8:94:a7:0f:10:75:ff:b7:c2:c9:7c:1e:18:35:b6: > 63:32:fe:40:04:45:b8:bf:92:08:0f:61:9a:0e:c1:56: > b2:21:62:5c:e5:e6:47:49:e7:42:b5:84:95:64:f3:20: > c1:94:a2:b2:ab:27:75:d4:44:1e:5f:b6:bd:70:df:dc > Fingerprint (MD5): > BD:53:36:A3:89:7E:DB:03:3B:B5:FE:40:CB:70:6F:62 > Fingerprint (SHA1): > 79:5A:F6:EC:4A:9D:8A:45:26:E0:38:63:EA:CE:20:17:3C:07:AB:A3 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" >Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" >Returned value is 0, expected result is pass >chains.sh: #3479: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171848 (0x123fcfc8) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" > Validity: > Not Before: Thu Mar 07 00:18:38 2013 > Not After : Wed Mar 07 00:18:38 2063 > Subject: "CN=Root9 ROOT CA,O=Root9,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c5:68:cf:ab:89:1f:0f:15:9c:8f:3d:2b:f5:b3:0c:3a: > ed:69:ec:a6:4c:ad:12:f8:35:dc:24:e1:cb:64:6c:81: > 0a:20:a1:d1:f8:e9:59:a1:80:59:ea:e9:43:15:2f:59: > b9:62:0a:24:a4:cf:b6:96:d7:74:91:72:93:06:b8:70: > 1c:be:ee:30:50:50:a7:0e:1f:fd:c3:71:ca:f0:13:02: > 22:4d:b7:b2:0a:31:45:58:c8:50:64:47:ef:e7:28:e3: > be:3a:c5:96:dc:52:71:8c:79:68:a0:28:3f:24:ad:84: > ba:74:ef:33:ae:24:54:c7:6e:d4:d9:44:e7:27:f4:93 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 11:9d:5d:7e:02:cf:7c:72:c0:a3:bd:e5:40:56:43:a4: > b8:c9:2a:06:3f:63:e7:69:b6:b4:7c:14:51:cb:4f:f9: > de:65:c8:78:68:1d:63:9e:6b:4f:f9:4c:b3:2a:f2:b2: > d9:10:6d:00:48:97:00:09:b4:69:8d:db:5c:e1:2a:5b: > 7b:b3:b2:75:99:c4:18:0d:b8:1a:c5:52:7e:21:d6:41: > 36:29:55:59:c4:46:32:a9:c9:95:6a:29:cb:fb:d8:ba: > 53:93:82:c0:53:67:2e:36:a9:31:96:46:1e:0c:2f:1f: > fd:45:97:ad:38:62:74:f1:ed:ed:96:a5:3b:26:14:83 > Fingerprint (MD5): > 59:44:38:72:D6:12:7B:4A:61:2D:5A:EB:3D:C2:1F:58 > Fingerprint (SHA1): > AE:EE:49:81:68:8B:FF:F2:55:7E:7E:C7:B6:E9:6C:76:47:A2:45:04 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" >Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" >Returned value is 0, expected result is pass >chains.sh: #3480: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der - PASSED >chains.sh: Creating DB RootDB >certutil -N -d RootDB -f RootDB/dbpasswd >chains.sh: #3481: Extension: Creating DB RootDB - PASSED >chains.sh: Creating Root CA Root >certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171863 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3482: Extension: Creating Root CA Root - PASSED >chains.sh: Exporting Root CA Root.der >certutil -L -d RootDB -r -n Root -o Root.der >chains.sh: #3483: Extension: Exporting Root CA Root.der - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #3484: Extension: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3485: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 306171864 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3486: Extension: Creating certficate CA1Root.der signed by Root - PASSED >chains.sh: Importing certificate CA1Root.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der >chains.sh: #3487: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #3488: Extension: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3489: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 306171865 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3490: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA2CA1.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der >chains.sh: #3491: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED >chains.sh: Creating DB UserDB >certutil -N -d UserDB -f UserDB/dbpasswd >chains.sh: #3492: Extension: Creating DB UserDB - PASSED >chains.sh: Creating EE certifiate request UserReq.der >certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3493: Extension: Creating EE certifiate request UserReq.der - PASSED >chains.sh: Creating certficate UserCA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 306171866 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3494: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED >chains.sh: Importing certificate UserCA2.der to UserDB database >certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der >chains.sh: #3495: Extension: Importing certificate UserCA2.der to UserDB database - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #3496: Extension: Creating DB AllDB - PASSED >chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171863 (0x123fcfd7) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:18:41 2013 > Not After : Wed Mar 07 00:18:41 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e3:2c:35:43:97:b4:00:fa:97:52:58:9c:b4:4f:42:f7: > 3d:e9:6e:af:a1:ba:12:ac:24:34:b4:d1:98:c7:83:df: > f5:49:7a:2e:3c:43:d2:8c:7c:99:db:58:7c:8e:24:55: > 33:ac:68:d9:05:b4:6d:b3:06:0b:80:14:b3:f7:c2:25: > f3:2f:d2:f4:1a:29:d1:ad:72:b2:10:f4:b6:df:a1:53: > 4f:f1:62:6c:6f:a6:00:04:0e:f6:0d:c3:1a:77:7c:56: > 89:30:01:8c:52:96:e2:d0:64:75:f8:ce:60:9f:f7:cb: > 9a:ee:89:46:bd:7c:f8:c8:1b:30:67:d4:c0:cf:81:07 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > cf:2c:64:9e:59:6d:cf:2c:29:c3:45:bb:b1:fc:7d:95: > 98:64:54:27:c4:19:df:4a:6a:af:58:e0:8a:a0:dc:ce: > ef:cd:be:31:2f:9a:ee:42:fc:49:9c:fc:bd:d3:fa:53: > 44:3d:34:6b:b8:ed:3c:42:65:30:37:27:6a:d0:be:2d: > 30:4d:71:77:56:f3:c9:4c:4e:66:01:8c:5a:00:6c:b6: > 30:f5:1b:b1:79:ee:4e:22:04:08:d8:8f:c9:9e:22:f5: > 94:72:65:ee:b2:20:e2:4d:ef:90:6c:50:4d:a4:0b:82: > e9:49:90:f4:ca:c2:94:8c:89:e4:46:72:c0:cc:32:59 > Fingerprint (MD5): > B5:61:69:43:1A:6F:25:89:90:1C:47:0D:4E:3F:0C:78 > Fingerprint (SHA1): > 09:16:CC:17:C2:7F:43:A8:3B:23:02:F9:CD:FF:C5:CC:37:68:F3:49 >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3497: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED >chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der >vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3498: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED >chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171864 (0x123fcfd8) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:18:41 2013 > Not After : Wed Mar 07 00:18:41 2018 > Subject: "CN=CA1 Intermediate,O=CA1,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b9:36:73:46:0f:0a:08:9b:4b:de:f9:2f:d5:e7:fe:75: > 73:9e:fa:c3:5d:6d:d8:23:66:2e:e2:e1:5b:fb:85:bb: > d4:20:58:53:f0:90:0d:63:b3:2e:8c:20:05:2a:0b:e8: > d5:a5:bd:f9:9f:b2:5c:31:41:ba:e5:1f:06:1c:f2:1a: > b4:df:e8:de:f3:8a:68:fc:37:7a:b3:4c:79:40:2b:06: > f4:40:cd:65:a3:ca:77:78:4f:49:39:08:43:7c:3b:26: > 6c:eb:1f:b2:ec:26:e0:14:30:0b:ba:7f:fe:78:15:fb: > 28:fa:40:8e:0c:2b:ee:dc:9c:ed:4f:f3:89:17:fa:43 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 85:ba:42:28:31:24:d5:80:4f:c4:dd:27:1c:9f:11:9b: > 9f:c2:dd:0b:9b:a7:fe:85:81:6f:26:fa:69:43:1d:a4: > 8c:5b:34:d4:ef:99:f4:5c:34:33:33:cf:6a:a9:71:83: > f1:ba:9f:d3:4c:83:34:91:cc:8e:d3:67:ab:56:13:bb: > fa:b7:17:bc:eb:d8:41:f7:63:48:a0:67:86:77:2c:29: > 99:cc:85:ac:b3:9f:d7:3c:1d:86:e3:85:03:fa:0e:db: > 0d:ec:3c:8a:38:d4:15:6a:bd:cd:49:ad:9b:e9:5a:fa: > dc:da:91:cf:0c:28:76:e0:f2:1d:0d:63:ca:a7:83:7e > Fingerprint (MD5): > 5E:8A:67:CE:50:BD:F9:B4:65:6E:92:2D:F8:AC:D5:9B > Fingerprint (SHA1): > 21:30:21:1B:39:6E:F1:93:CB:DB:FE:11:63:65:29:23:70:68:91:C2 >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Returned value is 0, expected result is pass >chains.sh: #3499: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED >chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der >vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3500: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED >chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171865 (0x123fcfd9) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:18:41 2013 > Not After : Wed Mar 07 00:18:41 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d0:2f:ed:5b:99:83:64:46:e7:78:42:74:1b:5d:23:5f: > 7c:13:3a:6f:27:51:5d:82:99:dd:61:7e:67:5f:69:1c: > 77:32:77:5d:cc:78:09:37:e9:ca:e1:a7:e3:6b:77:a0: > f3:3a:5f:32:3e:d7:ce:0c:d3:82:9f:db:94:d2:37:3a: > 76:69:0c:1f:0c:97:b3:61:d0:ad:52:28:dc:f6:67:b8: > ec:63:10:c7:f5:44:58:b7:f7:4a:8d:e4:ee:c9:f5:14: > bc:62:4b:6b:53:1d:1f:98:de:4c:ba:f8:8b:99:2e:61: > 2b:72:27:e3:e6:59:80:df:24:8e:c1:d7:2f:4f:8c:ef > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 5f:41:99:05:bc:4d:8f:40:2c:c9:45:59:97:d1:25:aa: > 44:4f:76:ac:87:ea:f1:00:af:c7:07:06:62:17:b5:09: > 16:76:46:bb:33:40:06:12:86:da:72:a5:eb:01:c3:49: > 8c:a7:3e:41:a1:37:62:e0:39:59:01:85:a8:f7:27:fd: > 3b:1d:66:ba:90:6f:be:7d:a3:8b:6f:b0:5e:f4:dd:88: > f1:b5:77:8a:c1:f4:45:28:a1:df:9a:c7:8c:2b:c9:89: > 1c:5b:ee:33:22:74:47:d8:09:97:03:74:48:53:f7:73: > b3:5a:dc:5d:f1:c4:4b:d7:aa:6c:ec:0d:f0:ce:79:60 > Fingerprint (MD5): > 0F:34:14:D2:9A:4C:D0:1D:62:21:2B:33:AE:4B:AF:E7 > Fingerprint (SHA1): > 65:D9:C8:F3:B4:4B:13:75:F9:34:D4:C2:AD:97:96:32:3D:C6:FF:2B >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Returned value is 0, expected result is pass >chains.sh: #3501: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED >chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der >vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3502: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED >chains.sh: Importing certificate Root.der to AllDB database >certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der >chains.sh: #3503: Extension: Importing certificate Root.der to AllDB database - PASSED >chains.sh: Importing certificate CA1Root.der to AllDB database >certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der >chains.sh: #3504: Extension: Importing certificate CA1Root.der to AllDB database - PASSED >chains.sh: Importing certificate CA2CA1.der to AllDB database >certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der >chains.sh: #3505: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171863 (0x123fcfd7) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:18:41 2013 > Not After : Wed Mar 07 00:18:41 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e3:2c:35:43:97:b4:00:fa:97:52:58:9c:b4:4f:42:f7: > 3d:e9:6e:af:a1:ba:12:ac:24:34:b4:d1:98:c7:83:df: > f5:49:7a:2e:3c:43:d2:8c:7c:99:db:58:7c:8e:24:55: > 33:ac:68:d9:05:b4:6d:b3:06:0b:80:14:b3:f7:c2:25: > f3:2f:d2:f4:1a:29:d1:ad:72:b2:10:f4:b6:df:a1:53: > 4f:f1:62:6c:6f:a6:00:04:0e:f6:0d:c3:1a:77:7c:56: > 89:30:01:8c:52:96:e2:d0:64:75:f8:ce:60:9f:f7:cb: > 9a:ee:89:46:bd:7c:f8:c8:1b:30:67:d4:c0:cf:81:07 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > cf:2c:64:9e:59:6d:cf:2c:29:c3:45:bb:b1:fc:7d:95: > 98:64:54:27:c4:19:df:4a:6a:af:58:e0:8a:a0:dc:ce: > ef:cd:be:31:2f:9a:ee:42:fc:49:9c:fc:bd:d3:fa:53: > 44:3d:34:6b:b8:ed:3c:42:65:30:37:27:6a:d0:be:2d: > 30:4d:71:77:56:f3:c9:4c:4e:66:01:8c:5a:00:6c:b6: > 30:f5:1b:b1:79:ee:4e:22:04:08:d8:8f:c9:9e:22:f5: > 94:72:65:ee:b2:20:e2:4d:ef:90:6c:50:4d:a4:0b:82: > e9:49:90:f4:ca:c2:94:8c:89:e4:46:72:c0:cc:32:59 > Fingerprint (MD5): > B5:61:69:43:1A:6F:25:89:90:1C:47:0D:4E:3F:0C:78 > Fingerprint (SHA1): > 09:16:CC:17:C2:7F:43:A8:3B:23:02:F9:CD:FF:C5:CC:37:68:F3:49 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3506: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root >vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. Root [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3507: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171864 (0x123fcfd8) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:18:41 2013 > Not After : Wed Mar 07 00:18:41 2018 > Subject: "CN=CA1 Intermediate,O=CA1,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b9:36:73:46:0f:0a:08:9b:4b:de:f9:2f:d5:e7:fe:75: > 73:9e:fa:c3:5d:6d:d8:23:66:2e:e2:e1:5b:fb:85:bb: > d4:20:58:53:f0:90:0d:63:b3:2e:8c:20:05:2a:0b:e8: > d5:a5:bd:f9:9f:b2:5c:31:41:ba:e5:1f:06:1c:f2:1a: > b4:df:e8:de:f3:8a:68:fc:37:7a:b3:4c:79:40:2b:06: > f4:40:cd:65:a3:ca:77:78:4f:49:39:08:43:7c:3b:26: > 6c:eb:1f:b2:ec:26:e0:14:30:0b:ba:7f:fe:78:15:fb: > 28:fa:40:8e:0c:2b:ee:dc:9c:ed:4f:f3:89:17:fa:43 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 85:ba:42:28:31:24:d5:80:4f:c4:dd:27:1c:9f:11:9b: > 9f:c2:dd:0b:9b:a7:fe:85:81:6f:26:fa:69:43:1d:a4: > 8c:5b:34:d4:ef:99:f4:5c:34:33:33:cf:6a:a9:71:83: > f1:ba:9f:d3:4c:83:34:91:cc:8e:d3:67:ab:56:13:bb: > fa:b7:17:bc:eb:d8:41:f7:63:48:a0:67:86:77:2c:29: > 99:cc:85:ac:b3:9f:d7:3c:1d:86:e3:85:03:fa:0e:db: > 0d:ec:3c:8a:38:d4:15:6a:bd:cd:49:ad:9b:e9:5a:fa: > dc:da:91:cf:0c:28:76:e0:f2:1d:0d:63:ca:a7:83:7e > Fingerprint (MD5): > 5E:8A:67:CE:50:BD:F9:B4:65:6E:92:2D:F8:AC:D5:9B > Fingerprint (SHA1): > 21:30:21:1B:39:6E:F1:93:CB:DB:FE:11:63:65:29:23:70:68:91:C2 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Returned value is 0, expected result is pass >chains.sh: #3508: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 >vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. CA1 [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3509: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171865 (0x123fcfd9) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:18:41 2013 > Not After : Wed Mar 07 00:18:41 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d0:2f:ed:5b:99:83:64:46:e7:78:42:74:1b:5d:23:5f: > 7c:13:3a:6f:27:51:5d:82:99:dd:61:7e:67:5f:69:1c: > 77:32:77:5d:cc:78:09:37:e9:ca:e1:a7:e3:6b:77:a0: > f3:3a:5f:32:3e:d7:ce:0c:d3:82:9f:db:94:d2:37:3a: > 76:69:0c:1f:0c:97:b3:61:d0:ad:52:28:dc:f6:67:b8: > ec:63:10:c7:f5:44:58:b7:f7:4a:8d:e4:ee:c9:f5:14: > bc:62:4b:6b:53:1d:1f:98:de:4c:ba:f8:8b:99:2e:61: > 2b:72:27:e3:e6:59:80:df:24:8e:c1:d7:2f:4f:8c:ef > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 5f:41:99:05:bc:4d:8f:40:2c:c9:45:59:97:d1:25:aa: > 44:4f:76:ac:87:ea:f1:00:af:c7:07:06:62:17:b5:09: > 16:76:46:bb:33:40:06:12:86:da:72:a5:eb:01:c3:49: > 8c:a7:3e:41:a1:37:62:e0:39:59:01:85:a8:f7:27:fd: > 3b:1d:66:ba:90:6f:be:7d:a3:8b:6f:b0:5e:f4:dd:88: > f1:b5:77:8a:c1:f4:45:28:a1:df:9a:c7:8c:2b:c9:89: > 1c:5b:ee:33:22:74:47:d8:09:97:03:74:48:53:f7:73: > b3:5a:dc:5d:f1:c4:4b:d7:aa:6c:ec:0d:f0:ce:79:60 > Fingerprint (MD5): > 0F:34:14:D2:9A:4C:D0:1D:62:21:2B:33:AE:4B:AF:E7 > Fingerprint (SHA1): > 65:D9:C8:F3:B4:4B:13:75:F9:34:D4:C2:AD:97:96:32:3D:C6:FF:2B > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Returned value is 0, expected result is pass >chains.sh: #3510: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 >vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. CA2 [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3511: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED >chains.sh: Creating DB RootDB >certutil -N -d RootDB -f RootDB/dbpasswd >chains.sh: #3512: Extension2: Creating DB RootDB - PASSED >chains.sh: Creating Root CA Root >certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171867 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3513: Extension2: Creating Root CA Root - PASSED >chains.sh: Exporting Root CA Root.der >certutil -L -d RootDB -r -n Root -o Root.der >chains.sh: #3514: Extension2: Exporting Root CA Root.der - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #3515: Extension2: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3516: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 306171868 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >y >OID.2.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3517: Extension2: Creating certficate CA1Root.der signed by Root - PASSED >chains.sh: Importing certificate CA1Root.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der >chains.sh: #3518: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #3519: Extension2: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3520: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 306171869 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >y >OID.2.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3521: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA2CA1.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der >chains.sh: #3522: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED >chains.sh: Creating DB User1DB >certutil -N -d User1DB -f User1DB/dbpasswd >chains.sh: #3523: Extension2: Creating DB User1DB - PASSED >chains.sh: Creating EE certifiate request User1Req.der >certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3524: Extension2: Creating EE certifiate request User1Req.der - PASSED >chains.sh: Creating certficate User1CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 306171870 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3525: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate User1CA2.der to User1DB database >certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der >chains.sh: #3526: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED >chains.sh: Creating DB User2DB >certutil -N -d User2DB -f User2DB/dbpasswd >chains.sh: #3527: Extension2: Creating DB User2DB - PASSED >chains.sh: Creating EE certifiate request User2Req.der >certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3528: Extension2: Creating EE certifiate request User2Req.der - PASSED >chains.sh: Creating certficate User2CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 306171871 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >y >OID.2.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3529: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate User2CA2.der to User2DB database >certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der >chains.sh: #3530: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #3531: Extension2: Creating DB AllDB - PASSED >chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der >vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171867 (0x123fcfdb) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:18:42 2013 > Not After : Wed Mar 07 00:18:42 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > cc:88:5f:e3:0d:04:9e:0d:cd:d8:5f:c0:09:17:0b:d7: > 3a:91:36:04:85:c7:a7:05:a7:d6:3a:30:c5:fe:4c:66: > 76:d6:8a:0f:64:b3:80:db:94:b2:eb:6f:3c:b8:ee:cc: > 32:f0:df:0f:de:02:7b:51:d4:b7:69:d2:f0:06:08:63: > ec:8a:30:14:de:4a:50:56:30:5c:d4:7a:de:98:4c:82: > 32:75:d4:0b:d3:44:97:1b:4d:84:00:67:04:19:fe:a0: > 2f:7c:d4:34:d7:98:b9:b6:ac:8a:dd:84:8b:f6:bb:7a: > ec:66:99:e6:86:31:36:71:a1:46:9b:ba:86:f6:66:57 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2d:05:f5:3b:e2:24:28:06:6a:34:e3:4f:f3:c2:e7:8b: > d7:3b:ed:ab:bc:59:ad:18:8e:69:43:58:b0:ff:6f:88: > c2:6e:87:5c:ea:9d:2e:16:33:da:16:24:8e:97:05:ab: > 8b:b0:4c:ff:3b:98:e3:04:c3:98:8b:09:29:01:c2:5f: > 35:61:90:16:7a:62:41:2e:fa:4a:7f:77:20:29:1e:f0: > 31:3d:47:b3:8b:34:c5:cc:14:5f:49:31:75:6f:9f:80: > 72:18:22:13:84:96:bc:de:d0:42:3a:6e:bb:62:92:6f: > f6:a8:40:7b:8e:10:4a:8b:eb:bb:bb:11:2a:ba:fa:c4 > Fingerprint (MD5): > 39:B7:1B:63:9A:AE:D4:76:83:D6:5D:F1:D1:83:11:AC > Fingerprint (SHA1): > 51:4D:47:08:69:74:80:51:60:72:2B:1D:B8:B1:F9:82:E1:D4:98:BD >Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3532: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED >chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der >vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3533: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED >chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der >vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171868 (0x123fcfdc) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:18:42 2013 > Not After : Wed Mar 07 00:18:42 2018 > Subject: "CN=CA1 Intermediate,O=CA1,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b8:fc:fa:79:d3:c7:cf:74:c4:1a:c8:62:df:7f:b8:84: > b8:fa:62:29:b2:94:ec:cc:92:9c:7e:3b:5f:7b:c7:96: > 23:d3:d1:24:4c:1d:06:db:8c:85:b2:4e:3e:a5:c5:91: > d2:22:58:3b:2b:56:da:77:45:77:7e:44:16:51:b3:71: > be:a1:ed:cc:8e:f5:13:47:9d:28:92:e8:e5:c0:77:9d: > d8:16:ef:e6:d1:d9:5d:7a:33:86:83:0f:33:3c:36:bc: > 6c:69:de:70:2c:27:22:0f:46:b5:37:89:db:af:12:f7: > 88:46:10:07:7a:78:04:a1:7f:4d:43:d0:f4:f2:47:8b > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Policy Name: OID.2.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 5b:99:bc:ce:58:fa:6c:e1:31:09:fe:8d:9c:55:31:17: > 93:89:c8:c2:93:ee:d0:52:ab:bf:1e:3a:b7:40:89:a5: > 0f:eb:04:28:36:c9:fd:81:76:be:9b:31:4b:4a:51:8f: > 3f:e9:7c:26:4a:d0:a7:9a:38:f1:2b:09:ce:c2:bf:50: > 09:ff:70:a8:33:a5:8a:58:35:c2:44:8c:57:47:4b:61: > d5:26:80:26:26:30:78:08:b7:3d:5f:6b:8d:6c:24:cf: > 9f:f6:9c:21:e7:1b:67:4e:c1:1d:ae:ae:ba:9a:e3:ca: > 1a:bc:aa:01:bf:a4:dc:18:a9:de:c5:6d:ec:01:e9:42 > Fingerprint (MD5): > 00:20:1A:89:62:1A:98:1D:0A:63:65:4F:AE:C2:60:8D > Fingerprint (SHA1): > 1C:36:93:9C:D0:1D:7F:9A:3E:CE:73:A7:DD:19:E5:72:27:A0:32:1E >Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Returned value is 0, expected result is pass >chains.sh: #3534: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED >chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der >vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3535: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED >chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der >vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171869 (0x123fcfdd) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:18:43 2013 > Not After : Wed Mar 07 00:18:43 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ba:53:78:31:31:ab:38:9f:79:ae:d1:4a:93:4a:8a:aa: > eb:79:b5:19:28:82:86:5b:f6:c9:c0:41:07:11:a1:54: > a9:cf:26:e3:55:ec:c6:b0:02:c2:89:ae:01:57:f9:8f: > 05:e5:6f:0b:f0:52:6d:51:36:c3:8b:00:29:b4:fd:cd: > 38:2f:e2:72:13:80:ba:e2:b6:46:dd:87:70:a3:f4:37: > 27:f4:4c:a2:dc:37:a8:0c:c3:bc:0a:72:a0:3c:74:0e: > 14:9f:0e:c9:25:ad:d5:30:ec:15:97:40:01:ce:ba:76: > 53:9c:97:b2:a1:97:85:89:48:ce:a6:2d:62:78:97:35 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Policy Name: OID.2.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 17:f5:ee:e5:f8:c5:bf:56:4c:1f:e0:c5:2d:d0:c8:f3: > 5c:65:5a:0e:6d:2c:38:53:47:7a:d0:de:77:63:73:cf: > fc:d1:00:fb:14:81:c2:e1:2f:e0:58:19:94:f0:96:5d: > d1:44:54:65:da:82:01:ba:20:08:81:45:ce:1d:2a:b9: > bf:21:86:ce:e3:81:24:e6:43:9f:fb:7f:c8:e1:93:4c: > b5:2a:65:f4:05:86:ab:07:7e:2c:76:9f:9f:39:e6:19: > d7:7d:5a:7e:64:b9:ed:fd:25:e3:fd:80:f7:8f:ee:ee: > e0:3b:5f:af:b2:56:6f:c5:14:23:69:51:f9:c8:c1:7e > Fingerprint (MD5): > 0D:40:92:C0:86:CA:FC:26:89:D7:5C:26:57:D4:42:73 > Fingerprint (SHA1): > 19:77:04:DC:69:23:51:E1:15:83:A0:9D:4A:65:57:58:3A:5D:D1:F0 >Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3536: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED >chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der >vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3537: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED >chains.sh: Importing certificate Root.der to AllDB database >certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der >chains.sh: #3538: Extension2: Importing certificate Root.der to AllDB database - PASSED >chains.sh: Importing certificate CA1Root.der to AllDB database >certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der >chains.sh: #3539: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED >chains.sh: Importing certificate CA2CA1.der to AllDB database >certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der >chains.sh: #3540: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED >chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root >vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171867 (0x123fcfdb) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:18:42 2013 > Not After : Wed Mar 07 00:18:42 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > cc:88:5f:e3:0d:04:9e:0d:cd:d8:5f:c0:09:17:0b:d7: > 3a:91:36:04:85:c7:a7:05:a7:d6:3a:30:c5:fe:4c:66: > 76:d6:8a:0f:64:b3:80:db:94:b2:eb:6f:3c:b8:ee:cc: > 32:f0:df:0f:de:02:7b:51:d4:b7:69:d2:f0:06:08:63: > ec:8a:30:14:de:4a:50:56:30:5c:d4:7a:de:98:4c:82: > 32:75:d4:0b:d3:44:97:1b:4d:84:00:67:04:19:fe:a0: > 2f:7c:d4:34:d7:98:b9:b6:ac:8a:dd:84:8b:f6:bb:7a: > ec:66:99:e6:86:31:36:71:a1:46:9b:ba:86:f6:66:57 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2d:05:f5:3b:e2:24:28:06:6a:34:e3:4f:f3:c2:e7:8b: > d7:3b:ed:ab:bc:59:ad:18:8e:69:43:58:b0:ff:6f:88: > c2:6e:87:5c:ea:9d:2e:16:33:da:16:24:8e:97:05:ab: > 8b:b0:4c:ff:3b:98:e3:04:c3:98:8b:09:29:01:c2:5f: > 35:61:90:16:7a:62:41:2e:fa:4a:7f:77:20:29:1e:f0: > 31:3d:47:b3:8b:34:c5:cc:14:5f:49:31:75:6f:9f:80: > 72:18:22:13:84:96:bc:de:d0:42:3a:6e:bb:62:92:6f: > f6:a8:40:7b:8e:10:4a:8b:eb:bb:bb:11:2a:ba:fa:c4 > Fingerprint (MD5): > 39:B7:1B:63:9A:AE:D4:76:83:D6:5D:F1:D1:83:11:AC > Fingerprint (SHA1): > 51:4D:47:08:69:74:80:51:60:72:2B:1D:B8:B1:F9:82:E1:D4:98:BD > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3541: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED >chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root >vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. Root [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3542: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED >chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 >vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171868 (0x123fcfdc) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:18:42 2013 > Not After : Wed Mar 07 00:18:42 2018 > Subject: "CN=CA1 Intermediate,O=CA1,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b8:fc:fa:79:d3:c7:cf:74:c4:1a:c8:62:df:7f:b8:84: > b8:fa:62:29:b2:94:ec:cc:92:9c:7e:3b:5f:7b:c7:96: > 23:d3:d1:24:4c:1d:06:db:8c:85:b2:4e:3e:a5:c5:91: > d2:22:58:3b:2b:56:da:77:45:77:7e:44:16:51:b3:71: > be:a1:ed:cc:8e:f5:13:47:9d:28:92:e8:e5:c0:77:9d: > d8:16:ef:e6:d1:d9:5d:7a:33:86:83:0f:33:3c:36:bc: > 6c:69:de:70:2c:27:22:0f:46:b5:37:89:db:af:12:f7: > 88:46:10:07:7a:78:04:a1:7f:4d:43:d0:f4:f2:47:8b > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Policy Name: OID.2.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 5b:99:bc:ce:58:fa:6c:e1:31:09:fe:8d:9c:55:31:17: > 93:89:c8:c2:93:ee:d0:52:ab:bf:1e:3a:b7:40:89:a5: > 0f:eb:04:28:36:c9:fd:81:76:be:9b:31:4b:4a:51:8f: > 3f:e9:7c:26:4a:d0:a7:9a:38:f1:2b:09:ce:c2:bf:50: > 09:ff:70:a8:33:a5:8a:58:35:c2:44:8c:57:47:4b:61: > d5:26:80:26:26:30:78:08:b7:3d:5f:6b:8d:6c:24:cf: > 9f:f6:9c:21:e7:1b:67:4e:c1:1d:ae:ae:ba:9a:e3:ca: > 1a:bc:aa:01:bf:a4:dc:18:a9:de:c5:6d:ec:01:e9:42 > Fingerprint (MD5): > 00:20:1A:89:62:1A:98:1D:0A:63:65:4F:AE:C2:60:8D > Fingerprint (SHA1): > 1C:36:93:9C:D0:1D:7F:9A:3E:CE:73:A7:DD:19:E5:72:27:A0:32:1E > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Returned value is 0, expected result is pass >chains.sh: #3543: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED >chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 >vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. CA1 [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3544: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED >chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 >vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171869 (0x123fcfdd) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:18:43 2013 > Not After : Wed Mar 07 00:18:43 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ba:53:78:31:31:ab:38:9f:79:ae:d1:4a:93:4a:8a:aa: > eb:79:b5:19:28:82:86:5b:f6:c9:c0:41:07:11:a1:54: > a9:cf:26:e3:55:ec:c6:b0:02:c2:89:ae:01:57:f9:8f: > 05:e5:6f:0b:f0:52:6d:51:36:c3:8b:00:29:b4:fd:cd: > 38:2f:e2:72:13:80:ba:e2:b6:46:dd:87:70:a3:f4:37: > 27:f4:4c:a2:dc:37:a8:0c:c3:bc:0a:72:a0:3c:74:0e: > 14:9f:0e:c9:25:ad:d5:30:ec:15:97:40:01:ce:ba:76: > 53:9c:97:b2:a1:97:85:89:48:ce:a6:2d:62:78:97:35 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Policy Name: OID.2.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 17:f5:ee:e5:f8:c5:bf:56:4c:1f:e0:c5:2d:d0:c8:f3: > 5c:65:5a:0e:6d:2c:38:53:47:7a:d0:de:77:63:73:cf: > fc:d1:00:fb:14:81:c2:e1:2f:e0:58:19:94:f0:96:5d: > d1:44:54:65:da:82:01:ba:20:08:81:45:ce:1d:2a:b9: > bf:21:86:ce:e3:81:24:e6:43:9f:fb:7f:c8:e1:93:4c: > b5:2a:65:f4:05:86:ab:07:7e:2c:76:9f:9f:39:e6:19: > d7:7d:5a:7e:64:b9:ed:fd:25:e3:fd:80:f7:8f:ee:ee: > e0:3b:5f:af:b2:56:6f:c5:14:23:69:51:f9:c8:c1:7e > Fingerprint (MD5): > 0D:40:92:C0:86:CA:FC:26:89:D7:5C:26:57:D4:42:73 > Fingerprint (SHA1): > 19:77:04:DC:69:23:51:E1:15:83:A0:9D:4A:65:57:58:3A:5D:D1:F0 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3545: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED >chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 >vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. CA2 [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3546: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED >chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root >vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171867 (0x123fcfdb) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:18:42 2013 > Not After : Wed Mar 07 00:18:42 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > cc:88:5f:e3:0d:04:9e:0d:cd:d8:5f:c0:09:17:0b:d7: > 3a:91:36:04:85:c7:a7:05:a7:d6:3a:30:c5:fe:4c:66: > 76:d6:8a:0f:64:b3:80:db:94:b2:eb:6f:3c:b8:ee:cc: > 32:f0:df:0f:de:02:7b:51:d4:b7:69:d2:f0:06:08:63: > ec:8a:30:14:de:4a:50:56:30:5c:d4:7a:de:98:4c:82: > 32:75:d4:0b:d3:44:97:1b:4d:84:00:67:04:19:fe:a0: > 2f:7c:d4:34:d7:98:b9:b6:ac:8a:dd:84:8b:f6:bb:7a: > ec:66:99:e6:86:31:36:71:a1:46:9b:ba:86:f6:66:57 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2d:05:f5:3b:e2:24:28:06:6a:34:e3:4f:f3:c2:e7:8b: > d7:3b:ed:ab:bc:59:ad:18:8e:69:43:58:b0:ff:6f:88: > c2:6e:87:5c:ea:9d:2e:16:33:da:16:24:8e:97:05:ab: > 8b:b0:4c:ff:3b:98:e3:04:c3:98:8b:09:29:01:c2:5f: > 35:61:90:16:7a:62:41:2e:fa:4a:7f:77:20:29:1e:f0: > 31:3d:47:b3:8b:34:c5:cc:14:5f:49:31:75:6f:9f:80: > 72:18:22:13:84:96:bc:de:d0:42:3a:6e:bb:62:92:6f: > f6:a8:40:7b:8e:10:4a:8b:eb:bb:bb:11:2a:ba:fa:c4 > Fingerprint (MD5): > 39:B7:1B:63:9A:AE:D4:76:83:D6:5D:F1:D1:83:11:AC > Fingerprint (SHA1): > 51:4D:47:08:69:74:80:51:60:72:2B:1D:B8:B1:F9:82:E1:D4:98:BD > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3547: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED >chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root >vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171867 (0x123fcfdb) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:18:42 2013 > Not After : Wed Mar 07 00:18:42 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > cc:88:5f:e3:0d:04:9e:0d:cd:d8:5f:c0:09:17:0b:d7: > 3a:91:36:04:85:c7:a7:05:a7:d6:3a:30:c5:fe:4c:66: > 76:d6:8a:0f:64:b3:80:db:94:b2:eb:6f:3c:b8:ee:cc: > 32:f0:df:0f:de:02:7b:51:d4:b7:69:d2:f0:06:08:63: > ec:8a:30:14:de:4a:50:56:30:5c:d4:7a:de:98:4c:82: > 32:75:d4:0b:d3:44:97:1b:4d:84:00:67:04:19:fe:a0: > 2f:7c:d4:34:d7:98:b9:b6:ac:8a:dd:84:8b:f6:bb:7a: > ec:66:99:e6:86:31:36:71:a1:46:9b:ba:86:f6:66:57 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2d:05:f5:3b:e2:24:28:06:6a:34:e3:4f:f3:c2:e7:8b: > d7:3b:ed:ab:bc:59:ad:18:8e:69:43:58:b0:ff:6f:88: > c2:6e:87:5c:ea:9d:2e:16:33:da:16:24:8e:97:05:ab: > 8b:b0:4c:ff:3b:98:e3:04:c3:98:8b:09:29:01:c2:5f: > 35:61:90:16:7a:62:41:2e:fa:4a:7f:77:20:29:1e:f0: > 31:3d:47:b3:8b:34:c5:cc:14:5f:49:31:75:6f:9f:80: > 72:18:22:13:84:96:bc:de:d0:42:3a:6e:bb:62:92:6f: > f6:a8:40:7b:8e:10:4a:8b:eb:bb:bb:11:2a:ba:fa:c4 > Fingerprint (MD5): > 39:B7:1B:63:9A:AE:D4:76:83:D6:5D:F1:D1:83:11:AC > Fingerprint (SHA1): > 51:4D:47:08:69:74:80:51:60:72:2B:1D:B8:B1:F9:82:E1:D4:98:BD > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3548: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED >chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 >vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171868 (0x123fcfdc) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:18:42 2013 > Not After : Wed Mar 07 00:18:42 2018 > Subject: "CN=CA1 Intermediate,O=CA1,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b8:fc:fa:79:d3:c7:cf:74:c4:1a:c8:62:df:7f:b8:84: > b8:fa:62:29:b2:94:ec:cc:92:9c:7e:3b:5f:7b:c7:96: > 23:d3:d1:24:4c:1d:06:db:8c:85:b2:4e:3e:a5:c5:91: > d2:22:58:3b:2b:56:da:77:45:77:7e:44:16:51:b3:71: > be:a1:ed:cc:8e:f5:13:47:9d:28:92:e8:e5:c0:77:9d: > d8:16:ef:e6:d1:d9:5d:7a:33:86:83:0f:33:3c:36:bc: > 6c:69:de:70:2c:27:22:0f:46:b5:37:89:db:af:12:f7: > 88:46:10:07:7a:78:04:a1:7f:4d:43:d0:f4:f2:47:8b > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Policy Name: OID.2.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 5b:99:bc:ce:58:fa:6c:e1:31:09:fe:8d:9c:55:31:17: > 93:89:c8:c2:93:ee:d0:52:ab:bf:1e:3a:b7:40:89:a5: > 0f:eb:04:28:36:c9:fd:81:76:be:9b:31:4b:4a:51:8f: > 3f:e9:7c:26:4a:d0:a7:9a:38:f1:2b:09:ce:c2:bf:50: > 09:ff:70:a8:33:a5:8a:58:35:c2:44:8c:57:47:4b:61: > d5:26:80:26:26:30:78:08:b7:3d:5f:6b:8d:6c:24:cf: > 9f:f6:9c:21:e7:1b:67:4e:c1:1d:ae:ae:ba:9a:e3:ca: > 1a:bc:aa:01:bf:a4:dc:18:a9:de:c5:6d:ec:01:e9:42 > Fingerprint (MD5): > 00:20:1A:89:62:1A:98:1D:0A:63:65:4F:AE:C2:60:8D > Fingerprint (SHA1): > 1C:36:93:9C:D0:1D:7F:9A:3E:CE:73:A7:DD:19:E5:72:27:A0:32:1E > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Returned value is 0, expected result is pass >chains.sh: #3549: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED >chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 >vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171868 (0x123fcfdc) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:18:42 2013 > Not After : Wed Mar 07 00:18:42 2018 > Subject: "CN=CA1 Intermediate,O=CA1,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b8:fc:fa:79:d3:c7:cf:74:c4:1a:c8:62:df:7f:b8:84: > b8:fa:62:29:b2:94:ec:cc:92:9c:7e:3b:5f:7b:c7:96: > 23:d3:d1:24:4c:1d:06:db:8c:85:b2:4e:3e:a5:c5:91: > d2:22:58:3b:2b:56:da:77:45:77:7e:44:16:51:b3:71: > be:a1:ed:cc:8e:f5:13:47:9d:28:92:e8:e5:c0:77:9d: > d8:16:ef:e6:d1:d9:5d:7a:33:86:83:0f:33:3c:36:bc: > 6c:69:de:70:2c:27:22:0f:46:b5:37:89:db:af:12:f7: > 88:46:10:07:7a:78:04:a1:7f:4d:43:d0:f4:f2:47:8b > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: OID.1.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 5b:99:bc:ce:58:fa:6c:e1:31:09:fe:8d:9c:55:31:17: > 93:89:c8:c2:93:ee:d0:52:ab:bf:1e:3a:b7:40:89:a5: > 0f:eb:04:28:36:c9:fd:81:76:be:9b:31:4b:4a:51:8f: > 3f:e9:7c:26:4a:d0:a7:9a:38:f1:2b:09:ce:c2:bf:50: > 09:ff:70:a8:33:a5:8a:58:35:c2:44:8c:57:47:4b:61: > d5:26:80:26:26:30:78:08:b7:3d:5f:6b:8d:6c:24:cf: > 9f:f6:9c:21:e7:1b:67:4e:c1:1d:ae:ae:ba:9a:e3:ca: > 1a:bc:aa:01:bf:a4:dc:18:a9:de:c5:6d:ec:01:e9:42 > Fingerprint (MD5): > 00:20:1A:89:62:1A:98:1D:0A:63:65:4F:AE:C2:60:8D > Fingerprint (SHA1): > 1C:36:93:9C:D0:1D:7F:9A:3E:CE:73:A7:DD:19:E5:72:27:A0:32:1E > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Returned value is 0, expected result is pass >chains.sh: #3550: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED >chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 >vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171869 (0x123fcfdd) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:18:43 2013 > Not After : Wed Mar 07 00:18:43 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ba:53:78:31:31:ab:38:9f:79:ae:d1:4a:93:4a:8a:aa: > eb:79:b5:19:28:82:86:5b:f6:c9:c0:41:07:11:a1:54: > a9:cf:26:e3:55:ec:c6:b0:02:c2:89:ae:01:57:f9:8f: > 05:e5:6f:0b:f0:52:6d:51:36:c3:8b:00:29:b4:fd:cd: > 38:2f:e2:72:13:80:ba:e2:b6:46:dd:87:70:a3:f4:37: > 27:f4:4c:a2:dc:37:a8:0c:c3:bc:0a:72:a0:3c:74:0e: > 14:9f:0e:c9:25:ad:d5:30:ec:15:97:40:01:ce:ba:76: > 53:9c:97:b2:a1:97:85:89:48:ce:a6:2d:62:78:97:35 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Policy Name: OID.2.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 17:f5:ee:e5:f8:c5:bf:56:4c:1f:e0:c5:2d:d0:c8:f3: > 5c:65:5a:0e:6d:2c:38:53:47:7a:d0:de:77:63:73:cf: > fc:d1:00:fb:14:81:c2:e1:2f:e0:58:19:94:f0:96:5d: > d1:44:54:65:da:82:01:ba:20:08:81:45:ce:1d:2a:b9: > bf:21:86:ce:e3:81:24:e6:43:9f:fb:7f:c8:e1:93:4c: > b5:2a:65:f4:05:86:ab:07:7e:2c:76:9f:9f:39:e6:19: > d7:7d:5a:7e:64:b9:ed:fd:25:e3:fd:80:f7:8f:ee:ee: > e0:3b:5f:af:b2:56:6f:c5:14:23:69:51:f9:c8:c1:7e > Fingerprint (MD5): > 0D:40:92:C0:86:CA:FC:26:89:D7:5C:26:57:D4:42:73 > Fingerprint (SHA1): > 19:77:04:DC:69:23:51:E1:15:83:A0:9D:4A:65:57:58:3A:5D:D1:F0 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" >Returned value is 0, expected result is pass >chains.sh: #3551: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED >chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 >vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171869 (0x123fcfdd) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:18:43 2013 > Not After : Wed Mar 07 00:18:43 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ba:53:78:31:31:ab:38:9f:79:ae:d1:4a:93:4a:8a:aa: > eb:79:b5:19:28:82:86:5b:f6:c9:c0:41:07:11:a1:54: > a9:cf:26:e3:55:ec:c6:b0:02:c2:89:ae:01:57:f9:8f: > 05:e5:6f:0b:f0:52:6d:51:36:c3:8b:00:29:b4:fd:cd: > 38:2f:e2:72:13:80:ba:e2:b6:46:dd:87:70:a3:f4:37: > 27:f4:4c:a2:dc:37:a8:0c:c3:bc:0a:72:a0:3c:74:0e: > 14:9f:0e:c9:25:ad:d5:30:ec:15:97:40:01:ce:ba:76: > 53:9c:97:b2:a1:97:85:89:48:ce:a6:2d:62:78:97:35 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: OID.1.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 17:f5:ee:e5:f8:c5:bf:56:4c:1f:e0:c5:2d:d0:c8:f3: > 5c:65:5a:0e:6d:2c:38:53:47:7a:d0:de:77:63:73:cf: > fc:d1:00:fb:14:81:c2:e1:2f:e0:58:19:94:f0:96:5d: > d1:44:54:65:da:82:01:ba:20:08:81:45:ce:1d:2a:b9: > bf:21:86:ce:e3:81:24:e6:43:9f:fb:7f:c8:e1:93:4c: > b5:2a:65:f4:05:86:ab:07:7e:2c:76:9f:9f:39:e6:19: > d7:7d:5a:7e:64:b9:ed:fd:25:e3:fd:80:f7:8f:ee:ee: > e0:3b:5f:af:b2:56:6f:c5:14:23:69:51:f9:c8:c1:7e > Fingerprint (MD5): > 0D:40:92:C0:86:CA:FC:26:89:D7:5C:26:57:D4:42:73 > Fingerprint (SHA1): > 19:77:04:DC:69:23:51:E1:15:83:A0:9D:4A:65:57:58:3A:5D:D1:F0 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" >Returned value is 0, expected result is pass >chains.sh: #3552: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED >chains.sh: Creating DB RootCADB >certutil -N -d RootCADB -f RootCADB/dbpasswd >chains.sh: #3553: AnyPolicy: Creating DB RootCADB - PASSED >chains.sh: Creating Root CA RootCA >certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171872 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3554: AnyPolicy: Creating Root CA RootCA - PASSED >chains.sh: Exporting Root CA RootCA.der >certutil -L -d RootCADB -r -n RootCA -o RootCA.der >chains.sh: #3555: AnyPolicy: Exporting Root CA RootCA.der - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #3556: AnyPolicy: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3557: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1RootCA.der signed by RootCA >certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 306171873 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3558: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED >chains.sh: Importing certificate CA1RootCA.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der >chains.sh: #3559: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #3560: AnyPolicy: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3561: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 306171874 --extCP --extIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >0 >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >Enter the number of certs in the path permitted to use anyPolicy. >(press Enter for 0) > Is this a critical extension [y/N]? >chains.sh: #3562: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA2CA1.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der >chains.sh: #3563: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED >chains.sh: Creating DB CA3DB >certutil -N -d CA3DB -f CA3DB/dbpasswd >chains.sh: #3564: AnyPolicy: Creating DB CA3DB - PASSED >chains.sh: Creating Intermediate certifiate request CA3Req.der >certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3565: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED >chains.sh: Creating certficate CA3CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 306171875 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3566: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA3CA1.der to CA3DB database >certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der >chains.sh: #3567: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED >chains.sh: Creating DB User1DB >certutil -N -d User1DB -f User1DB/dbpasswd >chains.sh: #3568: AnyPolicy: Creating DB User1DB - PASSED >chains.sh: Creating EE certifiate request User1Req.der >certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3569: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED >chains.sh: Creating certficate User1CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 306171876 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3570: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate User1CA2.der to User1DB database >certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der >chains.sh: #3571: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED >chains.sh: Creating DB User2DB >certutil -N -d User2DB -f User2DB/dbpasswd >chains.sh: #3572: AnyPolicy: Creating DB User2DB - PASSED >chains.sh: Creating EE certifiate request User2Req.der >certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3573: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED >chains.sh: Creating certficate User2CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 306171877 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3574: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate User2CA2.der to User2DB database >certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der >chains.sh: #3575: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED >chains.sh: Creating DB User3DB >certutil -N -d User3DB -f User3DB/dbpasswd >chains.sh: #3576: AnyPolicy: Creating DB User3DB - PASSED >chains.sh: Creating EE certifiate request User3Req.der >certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3577: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED >chains.sh: Creating certficate User3CA3.der signed by CA3 >certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 306171878 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3578: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED >chains.sh: Importing certificate User3CA3.der to User3DB database >certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der >chains.sh: #3579: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #3580: AnyPolicy: Creating DB AllDB - PASSED >chains.sh: Importing certificate RootCA.der to AllDB database >certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der >chains.sh: #3581: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED >chains.sh: Importing certificate CA1RootCA.der to AllDB database >certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der >chains.sh: #3582: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED >chains.sh: Importing certificate CA2CA1.der to AllDB database >certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der >chains.sh: #3583: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED >chains.sh: Importing certificate CA3CA1.der to AllDB database >certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der >chains.sh: #3584: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED >chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA >vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171872 (0x123fcfe0) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:18:44 2013 > Not After : Wed Mar 07 00:18:44 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ae:c1:3a:00:60:b1:09:fb:0b:6b:ac:9e:2d:74:2b:2d: > 64:76:2c:d4:05:87:de:99:8c:91:10:db:1f:3f:1b:2d: > 8a:bc:90:7f:50:f3:ba:dc:25:ea:7e:fc:9a:d9:ad:f3: > 2e:00:88:0a:26:15:7c:c0:d8:d9:e2:fc:15:0b:3c:43: > 9d:cc:3e:9b:e5:6c:b9:08:1f:d3:ad:e2:54:33:90:e8: > 91:49:4f:63:c2:99:3d:79:71:a5:8a:8b:85:78:61:1a: > 3e:de:49:27:18:4b:ae:12:9b:13:1d:93:61:cb:b0:57: > f8:cc:d2:f5:6e:0c:89:94:34:38:84:bf:88:15:c1:2b > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > ae:80:22:fc:90:f6:93:ec:a9:b1:a9:be:c8:22:04:b4: > 53:54:67:9f:b2:5f:17:74:0d:9c:e0:4a:79:13:ca:d9: > ce:f1:5f:77:77:9f:37:ff:06:81:f3:eb:66:9f:b4:e9: > 94:d7:23:00:d1:bf:15:bf:71:0d:5c:28:8a:ef:34:71: > 2f:e3:7e:dd:72:aa:6a:dc:82:aa:03:a0:6a:b8:01:2a: > 85:51:f4:ae:45:d6:71:39:0f:5b:22:2e:b6:6f:8b:c2: > 51:80:9c:a3:d3:6f:a4:7a:da:e4:f7:78:54:99:73:08: > 24:b5:45:cb:59:c5:ef:09:63:52:80:70:24:98:4d:8a > Fingerprint (MD5): > 2E:9A:02:6E:A4:91:3E:11:47:CC:E5:1E:D6:E3:3C:92 > Fingerprint (SHA1): > 1E:39:49:6D:6E:A0:7E:AE:2E:9A:83:12:C1:DD:5E:4F:BE:89:FE:6C > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3585: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED >chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA >vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. RootCA [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3586: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED >chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA >vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. RootCA [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3587: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED >chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA >vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. RootCA [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3588: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED >chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA >vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171872 (0x123fcfe0) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:18:44 2013 > Not After : Wed Mar 07 00:18:44 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ae:c1:3a:00:60:b1:09:fb:0b:6b:ac:9e:2d:74:2b:2d: > 64:76:2c:d4:05:87:de:99:8c:91:10:db:1f:3f:1b:2d: > 8a:bc:90:7f:50:f3:ba:dc:25:ea:7e:fc:9a:d9:ad:f3: > 2e:00:88:0a:26:15:7c:c0:d8:d9:e2:fc:15:0b:3c:43: > 9d:cc:3e:9b:e5:6c:b9:08:1f:d3:ad:e2:54:33:90:e8: > 91:49:4f:63:c2:99:3d:79:71:a5:8a:8b:85:78:61:1a: > 3e:de:49:27:18:4b:ae:12:9b:13:1d:93:61:cb:b0:57: > f8:cc:d2:f5:6e:0c:89:94:34:38:84:bf:88:15:c1:2b > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > ae:80:22:fc:90:f6:93:ec:a9:b1:a9:be:c8:22:04:b4: > 53:54:67:9f:b2:5f:17:74:0d:9c:e0:4a:79:13:ca:d9: > ce:f1:5f:77:77:9f:37:ff:06:81:f3:eb:66:9f:b4:e9: > 94:d7:23:00:d1:bf:15:bf:71:0d:5c:28:8a:ef:34:71: > 2f:e3:7e:dd:72:aa:6a:dc:82:aa:03:a0:6a:b8:01:2a: > 85:51:f4:ae:45:d6:71:39:0f:5b:22:2e:b6:6f:8b:c2: > 51:80:9c:a3:d3:6f:a4:7a:da:e4:f7:78:54:99:73:08: > 24:b5:45:cb:59:c5:ef:09:63:52:80:70:24:98:4d:8a > Fingerprint (MD5): > 2E:9A:02:6E:A4:91:3E:11:47:CC:E5:1E:D6:E3:3C:92 > Fingerprint (SHA1): > 1E:39:49:6D:6E:A0:7E:AE:2E:9A:83:12:C1:DD:5E:4F:BE:89:FE:6C > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" >Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3589: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED >chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA >vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. RootCA [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3590: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED >chains.sh: Creating DB RootCADB >certutil -N -d RootCADB -f RootCADB/dbpasswd >chains.sh: #3591: AnyPolicyWithLevel: Creating DB RootCADB - PASSED >chains.sh: Creating Root CA RootCA >certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171879 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3592: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED >chains.sh: Exporting Root CA RootCA.der >certutil -L -d RootCADB -r -n RootCA -o RootCA.der >chains.sh: #3593: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #3594: AnyPolicyWithLevel: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3595: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1RootCA.der signed by RootCA >certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 306171880 --extCP --extIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >n >n >1 >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >Enter the number of certs in the path permitted to use anyPolicy. >(press Enter for 0) > Is this a critical extension [y/N]? >chains.sh: #3596: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED >chains.sh: Importing certificate CA1RootCA.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der >chains.sh: #3597: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED >chains.sh: Creating DB CA12DB >certutil -N -d CA12DB -f CA12DB/dbpasswd >chains.sh: #3598: AnyPolicyWithLevel: Creating DB CA12DB - PASSED >chains.sh: Creating Intermediate certifiate request CA12Req.der >certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3599: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED >chains.sh: Creating certficate CA12CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 306171881 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3600: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA12CA1.der to CA12DB database >certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der >chains.sh: #3601: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED >chains.sh: Creating DB CA13DB >certutil -N -d CA13DB -f CA13DB/dbpasswd >chains.sh: #3602: AnyPolicyWithLevel: Creating DB CA13DB - PASSED >chains.sh: Creating Intermediate certifiate request CA13Req.der >certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3603: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED >chains.sh: Creating certficate CA13CA12.der signed by CA12 >certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 306171882 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3604: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED >chains.sh: Importing certificate CA13CA12.der to CA13DB database >certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der >chains.sh: #3605: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED >chains.sh: Creating DB EE1DB >certutil -N -d EE1DB -f EE1DB/dbpasswd >chains.sh: #3606: AnyPolicyWithLevel: Creating DB EE1DB - PASSED >chains.sh: Creating EE certifiate request EE1Req.der >certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3607: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED >chains.sh: Creating certficate EE1CA13.der signed by CA13 >certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 306171883 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3608: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED >chains.sh: Importing certificate EE1CA13.der to EE1DB database >certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der >chains.sh: #3609: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED >chains.sh: Creating DB CA22DB >certutil -N -d CA22DB -f CA22DB/dbpasswd >chains.sh: #3610: AnyPolicyWithLevel: Creating DB CA22DB - PASSED >chains.sh: Creating Intermediate certifiate request CA22Req.der >certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3611: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED >chains.sh: Creating certficate CA22CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 306171884 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3612: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA22CA1.der to CA22DB database >certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der >chains.sh: #3613: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED >chains.sh: Creating DB CA23DB >certutil -N -d CA23DB -f CA23DB/dbpasswd >chains.sh: #3614: AnyPolicyWithLevel: Creating DB CA23DB - PASSED >chains.sh: Creating Intermediate certifiate request CA23Req.der >certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3615: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED >chains.sh: Creating certficate CA23CA22.der signed by CA22 >certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 306171885 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3616: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED >chains.sh: Importing certificate CA23CA22.der to CA23DB database >certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der >chains.sh: #3617: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED >chains.sh: Creating DB EE2DB >certutil -N -d EE2DB -f EE2DB/dbpasswd >chains.sh: #3618: AnyPolicyWithLevel: Creating DB EE2DB - PASSED >chains.sh: Creating EE certifiate request EE2Req.der >certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3619: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED >chains.sh: Creating certficate EE2CA23.der signed by CA23 >certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 306171886 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3620: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED >chains.sh: Importing certificate EE2CA23.der to EE2DB database >certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der >chains.sh: #3621: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED >chains.sh: Creating DB CA32DB >certutil -N -d CA32DB -f CA32DB/dbpasswd >chains.sh: #3622: AnyPolicyWithLevel: Creating DB CA32DB - PASSED >chains.sh: Creating Intermediate certifiate request CA32Req.der >certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3623: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED >chains.sh: Creating certficate CA32CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 306171887 --extCP --extIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >n >n >1 >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >Enter the number of certs in the path permitted to use anyPolicy. >(press Enter for 0) > Is this a critical extension [y/N]? >chains.sh: #3624: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA32CA1.der to CA32DB database >certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der >chains.sh: #3625: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED >chains.sh: Creating DB CA33DB >certutil -N -d CA33DB -f CA33DB/dbpasswd >chains.sh: #3626: AnyPolicyWithLevel: Creating DB CA33DB - PASSED >chains.sh: Creating Intermediate certifiate request CA33Req.der >certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3627: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED >chains.sh: Creating certficate CA33CA32.der signed by CA32 >certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 306171888 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3628: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED >chains.sh: Importing certificate CA33CA32.der to CA33DB database >certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der >chains.sh: #3629: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED >chains.sh: Creating DB EE3DB >certutil -N -d EE3DB -f EE3DB/dbpasswd >chains.sh: #3630: AnyPolicyWithLevel: Creating DB EE3DB - PASSED >chains.sh: Creating EE certifiate request EE3Req.der >certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3631: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED >chains.sh: Creating certficate EE3CA33.der signed by CA33 >certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 306171889 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3632: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED >chains.sh: Importing certificate EE3CA33.der to EE3DB database >certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der >chains.sh: #3633: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED >chains.sh: Creating DB CA42DB >certutil -N -d CA42DB -f CA42DB/dbpasswd >chains.sh: #3634: AnyPolicyWithLevel: Creating DB CA42DB - PASSED >chains.sh: Creating Intermediate certifiate request CA42Req.der >certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3635: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED >chains.sh: Creating certficate CA42CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 306171890 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >y >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3636: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA42CA1.der to CA42DB database >certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der >chains.sh: #3637: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED >chains.sh: Creating DB CA43DB >certutil -N -d CA43DB -f CA43DB/dbpasswd >chains.sh: #3638: AnyPolicyWithLevel: Creating DB CA43DB - PASSED >chains.sh: Creating Intermediate certifiate request CA43Req.der >certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3639: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED >chains.sh: Creating certficate CA43CA42.der signed by CA42 >certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 306171891 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >y >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3640: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED >chains.sh: Importing certificate CA43CA42.der to CA43DB database >certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der >chains.sh: #3641: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED >chains.sh: Creating DB EE4DB >certutil -N -d EE4DB -f EE4DB/dbpasswd >chains.sh: #3642: AnyPolicyWithLevel: Creating DB EE4DB - PASSED >chains.sh: Creating EE certifiate request EE4Req.der >certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3643: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED >chains.sh: Creating certficate EE4CA43.der signed by CA43 >certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 306171892 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3644: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED >chains.sh: Importing certificate EE4CA43.der to EE4DB database >certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der >chains.sh: #3645: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED >chains.sh: Creating DB CA52DB >certutil -N -d CA52DB -f CA52DB/dbpasswd >chains.sh: #3646: AnyPolicyWithLevel: Creating DB CA52DB - PASSED >chains.sh: Creating Intermediate certifiate request CA52Req.der >certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3647: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED >chains.sh: Creating certficate CA52CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 306171893 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >y >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3648: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA52CA1.der to CA52DB database >certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der >chains.sh: #3649: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED >chains.sh: Creating DB CA53DB >certutil -N -d CA53DB -f CA53DB/dbpasswd >chains.sh: #3650: AnyPolicyWithLevel: Creating DB CA53DB - PASSED >chains.sh: Creating Intermediate certifiate request CA53Req.der >certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3651: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED >chains.sh: Creating certficate CA53CA52.der signed by CA52 >certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 306171894 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3652: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED >chains.sh: Importing certificate CA53CA52.der to CA53DB database >certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der >chains.sh: #3653: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED >chains.sh: Creating DB EE5DB >certutil -N -d EE5DB -f EE5DB/dbpasswd >chains.sh: #3654: AnyPolicyWithLevel: Creating DB EE5DB - PASSED >chains.sh: Creating EE certifiate request EE5Req.der >certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3655: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED >chains.sh: Creating certficate EE5CA53.der signed by CA53 >certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 306171895 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3656: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED >chains.sh: Importing certificate EE5CA53.der to EE5DB database >certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der >chains.sh: #3657: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED >chains.sh: Creating DB CA61DB >certutil -N -d CA61DB -f CA61DB/dbpasswd >chains.sh: #3658: AnyPolicyWithLevel: Creating DB CA61DB - PASSED >chains.sh: Creating Intermediate certifiate request CA61Req.der >certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3659: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED >chains.sh: Creating certficate CA61RootCA.der signed by RootCA >certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 306171896 --extCP --extIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >n >n >5 >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >Enter the number of certs in the path permitted to use anyPolicy. >(press Enter for 0) > Is this a critical extension [y/N]? >chains.sh: #3660: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED >chains.sh: Importing certificate CA61RootCA.der to CA61DB database >certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der >chains.sh: #3661: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED >chains.sh: Creating DB CA62DB >certutil -N -d CA62DB -f CA62DB/dbpasswd >chains.sh: #3662: AnyPolicyWithLevel: Creating DB CA62DB - PASSED >chains.sh: Creating Intermediate certifiate request CA62Req.der >certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3663: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED >chains.sh: Creating certficate CA62CA61.der signed by CA61 >certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 306171897 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3664: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED >chains.sh: Importing certificate CA62CA61.der to CA62DB database >certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der >chains.sh: #3665: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED >chains.sh: Creating DB EE62DB >certutil -N -d EE62DB -f EE62DB/dbpasswd >chains.sh: #3666: AnyPolicyWithLevel: Creating DB EE62DB - PASSED >chains.sh: Creating EE certifiate request EE62Req.der >certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3667: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED >chains.sh: Creating certficate EE62CA62.der signed by CA62 >certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 306171898 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3668: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED >chains.sh: Importing certificate EE62CA62.der to EE62DB database >certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der >chains.sh: #3669: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED >chains.sh: Creating DB CA63DB >certutil -N -d CA63DB -f CA63DB/dbpasswd >chains.sh: #3670: AnyPolicyWithLevel: Creating DB CA63DB - PASSED >chains.sh: Creating Intermediate certifiate request CA63Req.der >certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3671: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED >chains.sh: Creating certficate CA63CA62.der signed by CA62 >certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 306171899 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3672: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED >chains.sh: Importing certificate CA63CA62.der to CA63DB database >certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der >chains.sh: #3673: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED >chains.sh: Creating DB EE63DB >certutil -N -d EE63DB -f EE63DB/dbpasswd >chains.sh: #3674: AnyPolicyWithLevel: Creating DB EE63DB - PASSED >chains.sh: Creating EE certifiate request EE63Req.der >certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3675: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED >chains.sh: Creating certficate EE63CA63.der signed by CA63 >certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 306171900 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3676: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED >chains.sh: Importing certificate EE63CA63.der to EE63DB database >certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der >chains.sh: #3677: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED >chains.sh: Creating DB CA64DB >certutil -N -d CA64DB -f CA64DB/dbpasswd >chains.sh: #3678: AnyPolicyWithLevel: Creating DB CA64DB - PASSED >chains.sh: Creating Intermediate certifiate request CA64Req.der >certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3679: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED >chains.sh: Creating certficate CA64CA63.der signed by CA63 >certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 306171901 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3680: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED >chains.sh: Importing certificate CA64CA63.der to CA64DB database >certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der >chains.sh: #3681: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED >chains.sh: Creating DB EE64DB >certutil -N -d EE64DB -f EE64DB/dbpasswd >chains.sh: #3682: AnyPolicyWithLevel: Creating DB EE64DB - PASSED >chains.sh: Creating EE certifiate request EE64Req.der >certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3683: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED >chains.sh: Creating certficate EE64CA64.der signed by CA64 >certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 306171902 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3684: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED >chains.sh: Importing certificate EE64CA64.der to EE64DB database >certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der >chains.sh: #3685: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED >chains.sh: Creating DB CA65DB >certutil -N -d CA65DB -f CA65DB/dbpasswd >chains.sh: #3686: AnyPolicyWithLevel: Creating DB CA65DB - PASSED >chains.sh: Creating Intermediate certifiate request CA65Req.der >certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3687: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED >chains.sh: Creating certficate CA65CA64.der signed by CA64 >certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 306171903 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3688: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED >chains.sh: Importing certificate CA65CA64.der to CA65DB database >certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der >chains.sh: #3689: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED >chains.sh: Creating DB EE65DB >certutil -N -d EE65DB -f EE65DB/dbpasswd >chains.sh: #3690: AnyPolicyWithLevel: Creating DB EE65DB - PASSED >chains.sh: Creating EE certifiate request EE65Req.der >certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3691: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED >chains.sh: Creating certficate EE65CA65.der signed by CA65 >certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 306171904 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3692: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED >chains.sh: Importing certificate EE65CA65.der to EE65DB database >certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der >chains.sh: #3693: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED >chains.sh: Creating DB CA66DB >certutil -N -d CA66DB -f CA66DB/dbpasswd >chains.sh: #3694: AnyPolicyWithLevel: Creating DB CA66DB - PASSED >chains.sh: Creating Intermediate certifiate request CA66Req.der >certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3695: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED >chains.sh: Creating certficate CA66CA65.der signed by CA65 >certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 306171905 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3696: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED >chains.sh: Importing certificate CA66CA65.der to CA66DB database >certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der >chains.sh: #3697: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED >chains.sh: Creating DB EE66DB >certutil -N -d EE66DB -f EE66DB/dbpasswd >chains.sh: #3698: AnyPolicyWithLevel: Creating DB EE66DB - PASSED >chains.sh: Creating EE certifiate request EE66Req.der >certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3699: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED >chains.sh: Creating certficate EE66CA66.der signed by CA66 >certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 306171906 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3700: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED >chains.sh: Importing certificate EE66CA66.der to EE66DB database >certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der >chains.sh: #3701: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED >chains.sh: Creating DB CA67DB >certutil -N -d CA67DB -f CA67DB/dbpasswd >chains.sh: #3702: AnyPolicyWithLevel: Creating DB CA67DB - PASSED >chains.sh: Creating Intermediate certifiate request CA67Req.der >certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3703: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED >chains.sh: Creating certficate CA67CA66.der signed by CA66 >certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 306171907 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >any >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3704: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED >chains.sh: Importing certificate CA67CA66.der to CA67DB database >certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der >chains.sh: #3705: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED >chains.sh: Creating DB EE67DB >certutil -N -d EE67DB -f EE67DB/dbpasswd >chains.sh: #3706: AnyPolicyWithLevel: Creating DB EE67DB - PASSED >chains.sh: Creating EE certifiate request EE67Req.der >certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3707: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED >chains.sh: Creating certficate EE67CA67.der signed by CA67 >certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 306171908 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3708: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED >chains.sh: Importing certificate EE67CA67.der to EE67DB database >certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der >chains.sh: #3709: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #3710: AnyPolicyWithLevel: Creating DB AllDB - PASSED >chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171879 (0x123fcfe7) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:18:46 2013 > Not After : Wed Mar 07 00:18:46 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:39:62:eb:96:36:d0:0a:70:c3:10:02:7b:30:2e:5f: > 2e:9b:ac:35:3a:9d:2c:f8:e5:79:82:f0:4c:7d:4f:74: > 4d:ac:df:a8:67:98:d8:b1:fd:f7:c3:96:2b:15:1a:cf: > 3d:1d:ec:63:37:a7:52:34:42:82:66:2a:65:1f:37:91: > 7b:76:0b:f5:4a:ba:f7:ac:6e:6a:d2:0f:54:bf:e7:9e: > 55:4c:f7:0a:37:a9:70:8f:5e:e4:49:d9:42:51:4d:3d: > a2:5d:74:82:9d:24:98:0f:b0:cf:46:55:7e:c3:bb:8d: > 7d:27:6c:92:43:9c:75:0c:d6:c9:9a:97:04:36:22:0d > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > b0:ce:39:24:6b:c0:e3:fd:6e:69:99:65:b3:15:2c:d6: > 52:cb:b0:74:78:3f:26:19:ae:d3:0a:d5:fd:64:65:e3: > 81:73:bb:17:e8:08:8d:c5:c6:c8:bc:5b:f4:fb:08:2b: > d1:95:d7:5e:a4:a7:38:62:8b:8e:fe:d2:a8:2d:58:81: > b1:79:c3:da:48:ab:47:56:f5:29:d6:f8:c5:74:68:83: > 86:5b:07:0a:de:cc:3d:7b:2a:40:98:d8:08:16:8c:2e: > 5c:40:52:d3:b0:e5:1c:50:32:f4:b6:a2:b0:2d:d8:7b: > ca:76:fd:6b:47:35:21:34:49:34:b5:80:9d:bf:58:38 > Fingerprint (MD5): > 9E:C2:BE:C2:F5:75:06:9C:FE:88:E2:8A:8F:E0:51:D7 > Fingerprint (SHA1): > FB:76:AA:02:5C:A5:43:A8:25:B8:A9:A9:6B:13:BB:D3:7A:51:27:C4 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" >Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" >Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3711: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3712: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171879 (0x123fcfe7) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:18:46 2013 > Not After : Wed Mar 07 00:18:46 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:39:62:eb:96:36:d0:0a:70:c3:10:02:7b:30:2e:5f: > 2e:9b:ac:35:3a:9d:2c:f8:e5:79:82:f0:4c:7d:4f:74: > 4d:ac:df:a8:67:98:d8:b1:fd:f7:c3:96:2b:15:1a:cf: > 3d:1d:ec:63:37:a7:52:34:42:82:66:2a:65:1f:37:91: > 7b:76:0b:f5:4a:ba:f7:ac:6e:6a:d2:0f:54:bf:e7:9e: > 55:4c:f7:0a:37:a9:70:8f:5e:e4:49:d9:42:51:4d:3d: > a2:5d:74:82:9d:24:98:0f:b0:cf:46:55:7e:c3:bb:8d: > 7d:27:6c:92:43:9c:75:0c:d6:c9:9a:97:04:36:22:0d > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > b0:ce:39:24:6b:c0:e3:fd:6e:69:99:65:b3:15:2c:d6: > 52:cb:b0:74:78:3f:26:19:ae:d3:0a:d5:fd:64:65:e3: > 81:73:bb:17:e8:08:8d:c5:c6:c8:bc:5b:f4:fb:08:2b: > d1:95:d7:5e:a4:a7:38:62:8b:8e:fe:d2:a8:2d:58:81: > b1:79:c3:da:48:ab:47:56:f5:29:d6:f8:c5:74:68:83: > 86:5b:07:0a:de:cc:3d:7b:2a:40:98:d8:08:16:8c:2e: > 5c:40:52:d3:b0:e5:1c:50:32:f4:b6:a2:b0:2d:d8:7b: > ca:76:fd:6b:47:35:21:34:49:34:b5:80:9d:bf:58:38 > Fingerprint (MD5): > 9E:C2:BE:C2:F5:75:06:9C:FE:88:E2:8A:8F:E0:51:D7 > Fingerprint (SHA1): > FB:76:AA:02:5C:A5:43:A8:25:B8:A9:A9:6B:13:BB:D3:7A:51:27:C4 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" >Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" >Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3713: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3714: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3715: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3716: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der >vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171879 (0x123fcfe7) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:18:46 2013 > Not After : Wed Mar 07 00:18:46 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:39:62:eb:96:36:d0:0a:70:c3:10:02:7b:30:2e:5f: > 2e:9b:ac:35:3a:9d:2c:f8:e5:79:82:f0:4c:7d:4f:74: > 4d:ac:df:a8:67:98:d8:b1:fd:f7:c3:96:2b:15:1a:cf: > 3d:1d:ec:63:37:a7:52:34:42:82:66:2a:65:1f:37:91: > 7b:76:0b:f5:4a:ba:f7:ac:6e:6a:d2:0f:54:bf:e7:9e: > 55:4c:f7:0a:37:a9:70:8f:5e:e4:49:d9:42:51:4d:3d: > a2:5d:74:82:9d:24:98:0f:b0:cf:46:55:7e:c3:bb:8d: > 7d:27:6c:92:43:9c:75:0c:d6:c9:9a:97:04:36:22:0d > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > b0:ce:39:24:6b:c0:e3:fd:6e:69:99:65:b3:15:2c:d6: > 52:cb:b0:74:78:3f:26:19:ae:d3:0a:d5:fd:64:65:e3: > 81:73:bb:17:e8:08:8d:c5:c6:c8:bc:5b:f4:fb:08:2b: > d1:95:d7:5e:a4:a7:38:62:8b:8e:fe:d2:a8:2d:58:81: > b1:79:c3:da:48:ab:47:56:f5:29:d6:f8:c5:74:68:83: > 86:5b:07:0a:de:cc:3d:7b:2a:40:98:d8:08:16:8c:2e: > 5c:40:52:d3:b0:e5:1c:50:32:f4:b6:a2:b0:2d:d8:7b: > ca:76:fd:6b:47:35:21:34:49:34:b5:80:9d:bf:58:38 > Fingerprint (MD5): > 9E:C2:BE:C2:F5:75:06:9C:FE:88:E2:8A:8F:E0:51:D7 > Fingerprint (SHA1): > FB:76:AA:02:5C:A5:43:A8:25:B8:A9:A9:6B:13:BB:D3:7A:51:27:C4 >Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" >Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" >Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" >Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3717: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3718: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3719: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3720: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der >vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171879 (0x123fcfe7) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:18:46 2013 > Not After : Wed Mar 07 00:18:46 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:39:62:eb:96:36:d0:0a:70:c3:10:02:7b:30:2e:5f: > 2e:9b:ac:35:3a:9d:2c:f8:e5:79:82:f0:4c:7d:4f:74: > 4d:ac:df:a8:67:98:d8:b1:fd:f7:c3:96:2b:15:1a:cf: > 3d:1d:ec:63:37:a7:52:34:42:82:66:2a:65:1f:37:91: > 7b:76:0b:f5:4a:ba:f7:ac:6e:6a:d2:0f:54:bf:e7:9e: > 55:4c:f7:0a:37:a9:70:8f:5e:e4:49:d9:42:51:4d:3d: > a2:5d:74:82:9d:24:98:0f:b0:cf:46:55:7e:c3:bb:8d: > 7d:27:6c:92:43:9c:75:0c:d6:c9:9a:97:04:36:22:0d > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > b0:ce:39:24:6b:c0:e3:fd:6e:69:99:65:b3:15:2c:d6: > 52:cb:b0:74:78:3f:26:19:ae:d3:0a:d5:fd:64:65:e3: > 81:73:bb:17:e8:08:8d:c5:c6:c8:bc:5b:f4:fb:08:2b: > d1:95:d7:5e:a4:a7:38:62:8b:8e:fe:d2:a8:2d:58:81: > b1:79:c3:da:48:ab:47:56:f5:29:d6:f8:c5:74:68:83: > 86:5b:07:0a:de:cc:3d:7b:2a:40:98:d8:08:16:8c:2e: > 5c:40:52:d3:b0:e5:1c:50:32:f4:b6:a2:b0:2d:d8:7b: > ca:76:fd:6b:47:35:21:34:49:34:b5:80:9d:bf:58:38 > Fingerprint (MD5): > 9E:C2:BE:C2:F5:75:06:9C:FE:88:E2:8A:8F:E0:51:D7 > Fingerprint (SHA1): > FB:76:AA:02:5C:A5:43:A8:25:B8:A9:A9:6B:13:BB:D3:7A:51:27:C4 >Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" >Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" >Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" >Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3721: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171879 (0x123fcfe7) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:18:46 2013 > Not After : Wed Mar 07 00:18:46 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:39:62:eb:96:36:d0:0a:70:c3:10:02:7b:30:2e:5f: > 2e:9b:ac:35:3a:9d:2c:f8:e5:79:82:f0:4c:7d:4f:74: > 4d:ac:df:a8:67:98:d8:b1:fd:f7:c3:96:2b:15:1a:cf: > 3d:1d:ec:63:37:a7:52:34:42:82:66:2a:65:1f:37:91: > 7b:76:0b:f5:4a:ba:f7:ac:6e:6a:d2:0f:54:bf:e7:9e: > 55:4c:f7:0a:37:a9:70:8f:5e:e4:49:d9:42:51:4d:3d: > a2:5d:74:82:9d:24:98:0f:b0:cf:46:55:7e:c3:bb:8d: > 7d:27:6c:92:43:9c:75:0c:d6:c9:9a:97:04:36:22:0d > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > b0:ce:39:24:6b:c0:e3:fd:6e:69:99:65:b3:15:2c:d6: > 52:cb:b0:74:78:3f:26:19:ae:d3:0a:d5:fd:64:65:e3: > 81:73:bb:17:e8:08:8d:c5:c6:c8:bc:5b:f4:fb:08:2b: > d1:95:d7:5e:a4:a7:38:62:8b:8e:fe:d2:a8:2d:58:81: > b1:79:c3:da:48:ab:47:56:f5:29:d6:f8:c5:74:68:83: > 86:5b:07:0a:de:cc:3d:7b:2a:40:98:d8:08:16:8c:2e: > 5c:40:52:d3:b0:e5:1c:50:32:f4:b6:a2:b0:2d:d8:7b: > ca:76:fd:6b:47:35:21:34:49:34:b5:80:9d:bf:58:38 > Fingerprint (MD5): > 9E:C2:BE:C2:F5:75:06:9C:FE:88:E2:8A:8F:E0:51:D7 > Fingerprint (SHA1): > FB:76:AA:02:5C:A5:43:A8:25:B8:A9:A9:6B:13:BB:D3:7A:51:27:C4 >Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" >Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" >Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" >Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3722: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3723: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171879 (0x123fcfe7) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:18:46 2013 > Not After : Wed Mar 07 00:18:46 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:39:62:eb:96:36:d0:0a:70:c3:10:02:7b:30:2e:5f: > 2e:9b:ac:35:3a:9d:2c:f8:e5:79:82:f0:4c:7d:4f:74: > 4d:ac:df:a8:67:98:d8:b1:fd:f7:c3:96:2b:15:1a:cf: > 3d:1d:ec:63:37:a7:52:34:42:82:66:2a:65:1f:37:91: > 7b:76:0b:f5:4a:ba:f7:ac:6e:6a:d2:0f:54:bf:e7:9e: > 55:4c:f7:0a:37:a9:70:8f:5e:e4:49:d9:42:51:4d:3d: > a2:5d:74:82:9d:24:98:0f:b0:cf:46:55:7e:c3:bb:8d: > 7d:27:6c:92:43:9c:75:0c:d6:c9:9a:97:04:36:22:0d > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > b0:ce:39:24:6b:c0:e3:fd:6e:69:99:65:b3:15:2c:d6: > 52:cb:b0:74:78:3f:26:19:ae:d3:0a:d5:fd:64:65:e3: > 81:73:bb:17:e8:08:8d:c5:c6:c8:bc:5b:f4:fb:08:2b: > d1:95:d7:5e:a4:a7:38:62:8b:8e:fe:d2:a8:2d:58:81: > b1:79:c3:da:48:ab:47:56:f5:29:d6:f8:c5:74:68:83: > 86:5b:07:0a:de:cc:3d:7b:2a:40:98:d8:08:16:8c:2e: > 5c:40:52:d3:b0:e5:1c:50:32:f4:b6:a2:b0:2d:d8:7b: > ca:76:fd:6b:47:35:21:34:49:34:b5:80:9d:bf:58:38 > Fingerprint (MD5): > 9E:C2:BE:C2:F5:75:06:9C:FE:88:E2:8A:8F:E0:51:D7 > Fingerprint (SHA1): > FB:76:AA:02:5C:A5:43:A8:25:B8:A9:A9:6B:13:BB:D3:7A:51:27:C4 >Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" >Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" >Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" >Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3724: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3725: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3726: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3727: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der >vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171879 (0x123fcfe7) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:18:46 2013 > Not After : Wed Mar 07 00:18:46 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:39:62:eb:96:36:d0:0a:70:c3:10:02:7b:30:2e:5f: > 2e:9b:ac:35:3a:9d:2c:f8:e5:79:82:f0:4c:7d:4f:74: > 4d:ac:df:a8:67:98:d8:b1:fd:f7:c3:96:2b:15:1a:cf: > 3d:1d:ec:63:37:a7:52:34:42:82:66:2a:65:1f:37:91: > 7b:76:0b:f5:4a:ba:f7:ac:6e:6a:d2:0f:54:bf:e7:9e: > 55:4c:f7:0a:37:a9:70:8f:5e:e4:49:d9:42:51:4d:3d: > a2:5d:74:82:9d:24:98:0f:b0:cf:46:55:7e:c3:bb:8d: > 7d:27:6c:92:43:9c:75:0c:d6:c9:9a:97:04:36:22:0d > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > b0:ce:39:24:6b:c0:e3:fd:6e:69:99:65:b3:15:2c:d6: > 52:cb:b0:74:78:3f:26:19:ae:d3:0a:d5:fd:64:65:e3: > 81:73:bb:17:e8:08:8d:c5:c6:c8:bc:5b:f4:fb:08:2b: > d1:95:d7:5e:a4:a7:38:62:8b:8e:fe:d2:a8:2d:58:81: > b1:79:c3:da:48:ab:47:56:f5:29:d6:f8:c5:74:68:83: > 86:5b:07:0a:de:cc:3d:7b:2a:40:98:d8:08:16:8c:2e: > 5c:40:52:d3:b0:e5:1c:50:32:f4:b6:a2:b0:2d:d8:7b: > ca:76:fd:6b:47:35:21:34:49:34:b5:80:9d:bf:58:38 > Fingerprint (MD5): > 9E:C2:BE:C2:F5:75:06:9C:FE:88:E2:8A:8F:E0:51:D7 > Fingerprint (SHA1): > FB:76:AA:02:5C:A5:43:A8:25:B8:A9:A9:6B:13:BB:D3:7A:51:27:C4 >Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" >Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" >Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" >Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3728: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171879 (0x123fcfe7) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:18:46 2013 > Not After : Wed Mar 07 00:18:46 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:39:62:eb:96:36:d0:0a:70:c3:10:02:7b:30:2e:5f: > 2e:9b:ac:35:3a:9d:2c:f8:e5:79:82:f0:4c:7d:4f:74: > 4d:ac:df:a8:67:98:d8:b1:fd:f7:c3:96:2b:15:1a:cf: > 3d:1d:ec:63:37:a7:52:34:42:82:66:2a:65:1f:37:91: > 7b:76:0b:f5:4a:ba:f7:ac:6e:6a:d2:0f:54:bf:e7:9e: > 55:4c:f7:0a:37:a9:70:8f:5e:e4:49:d9:42:51:4d:3d: > a2:5d:74:82:9d:24:98:0f:b0:cf:46:55:7e:c3:bb:8d: > 7d:27:6c:92:43:9c:75:0c:d6:c9:9a:97:04:36:22:0d > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > b0:ce:39:24:6b:c0:e3:fd:6e:69:99:65:b3:15:2c:d6: > 52:cb:b0:74:78:3f:26:19:ae:d3:0a:d5:fd:64:65:e3: > 81:73:bb:17:e8:08:8d:c5:c6:c8:bc:5b:f4:fb:08:2b: > d1:95:d7:5e:a4:a7:38:62:8b:8e:fe:d2:a8:2d:58:81: > b1:79:c3:da:48:ab:47:56:f5:29:d6:f8:c5:74:68:83: > 86:5b:07:0a:de:cc:3d:7b:2a:40:98:d8:08:16:8c:2e: > 5c:40:52:d3:b0:e5:1c:50:32:f4:b6:a2:b0:2d:d8:7b: > ca:76:fd:6b:47:35:21:34:49:34:b5:80:9d:bf:58:38 > Fingerprint (MD5): > 9E:C2:BE:C2:F5:75:06:9C:FE:88:E2:8A:8F:E0:51:D7 > Fingerprint (SHA1): > FB:76:AA:02:5C:A5:43:A8:25:B8:A9:A9:6B:13:BB:D3:7A:51:27:C4 >Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" >Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" >Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" >Returned value is 0, expected result is pass >chains.sh: #3729: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171879 (0x123fcfe7) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:18:46 2013 > Not After : Wed Mar 07 00:18:46 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:39:62:eb:96:36:d0:0a:70:c3:10:02:7b:30:2e:5f: > 2e:9b:ac:35:3a:9d:2c:f8:e5:79:82:f0:4c:7d:4f:74: > 4d:ac:df:a8:67:98:d8:b1:fd:f7:c3:96:2b:15:1a:cf: > 3d:1d:ec:63:37:a7:52:34:42:82:66:2a:65:1f:37:91: > 7b:76:0b:f5:4a:ba:f7:ac:6e:6a:d2:0f:54:bf:e7:9e: > 55:4c:f7:0a:37:a9:70:8f:5e:e4:49:d9:42:51:4d:3d: > a2:5d:74:82:9d:24:98:0f:b0:cf:46:55:7e:c3:bb:8d: > 7d:27:6c:92:43:9c:75:0c:d6:c9:9a:97:04:36:22:0d > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > b0:ce:39:24:6b:c0:e3:fd:6e:69:99:65:b3:15:2c:d6: > 52:cb:b0:74:78:3f:26:19:ae:d3:0a:d5:fd:64:65:e3: > 81:73:bb:17:e8:08:8d:c5:c6:c8:bc:5b:f4:fb:08:2b: > d1:95:d7:5e:a4:a7:38:62:8b:8e:fe:d2:a8:2d:58:81: > b1:79:c3:da:48:ab:47:56:f5:29:d6:f8:c5:74:68:83: > 86:5b:07:0a:de:cc:3d:7b:2a:40:98:d8:08:16:8c:2e: > 5c:40:52:d3:b0:e5:1c:50:32:f4:b6:a2:b0:2d:d8:7b: > ca:76:fd:6b:47:35:21:34:49:34:b5:80:9d:bf:58:38 > Fingerprint (MD5): > 9E:C2:BE:C2:F5:75:06:9C:FE:88:E2:8A:8F:E0:51:D7 > Fingerprint (SHA1): > FB:76:AA:02:5C:A5:43:A8:25:B8:A9:A9:6B:13:BB:D3:7A:51:27:C4 >Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" >Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" >Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" >Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" >Returned value is 0, expected result is pass >chains.sh: #3730: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171879 (0x123fcfe7) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:18:46 2013 > Not After : Wed Mar 07 00:18:46 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:39:62:eb:96:36:d0:0a:70:c3:10:02:7b:30:2e:5f: > 2e:9b:ac:35:3a:9d:2c:f8:e5:79:82:f0:4c:7d:4f:74: > 4d:ac:df:a8:67:98:d8:b1:fd:f7:c3:96:2b:15:1a:cf: > 3d:1d:ec:63:37:a7:52:34:42:82:66:2a:65:1f:37:91: > 7b:76:0b:f5:4a:ba:f7:ac:6e:6a:d2:0f:54:bf:e7:9e: > 55:4c:f7:0a:37:a9:70:8f:5e:e4:49:d9:42:51:4d:3d: > a2:5d:74:82:9d:24:98:0f:b0:cf:46:55:7e:c3:bb:8d: > 7d:27:6c:92:43:9c:75:0c:d6:c9:9a:97:04:36:22:0d > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > b0:ce:39:24:6b:c0:e3:fd:6e:69:99:65:b3:15:2c:d6: > 52:cb:b0:74:78:3f:26:19:ae:d3:0a:d5:fd:64:65:e3: > 81:73:bb:17:e8:08:8d:c5:c6:c8:bc:5b:f4:fb:08:2b: > d1:95:d7:5e:a4:a7:38:62:8b:8e:fe:d2:a8:2d:58:81: > b1:79:c3:da:48:ab:47:56:f5:29:d6:f8:c5:74:68:83: > 86:5b:07:0a:de:cc:3d:7b:2a:40:98:d8:08:16:8c:2e: > 5c:40:52:d3:b0:e5:1c:50:32:f4:b6:a2:b0:2d:d8:7b: > ca:76:fd:6b:47:35:21:34:49:34:b5:80:9d:bf:58:38 > Fingerprint (MD5): > 9E:C2:BE:C2:F5:75:06:9C:FE:88:E2:8A:8F:E0:51:D7 > Fingerprint (SHA1): > FB:76:AA:02:5C:A5:43:A8:25:B8:A9:A9:6B:13:BB:D3:7A:51:27:C4 >Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" >Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" >Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" >Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" >Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" >Returned value is 0, expected result is pass >chains.sh: #3731: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171879 (0x123fcfe7) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:18:46 2013 > Not After : Wed Mar 07 00:18:46 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:39:62:eb:96:36:d0:0a:70:c3:10:02:7b:30:2e:5f: > 2e:9b:ac:35:3a:9d:2c:f8:e5:79:82:f0:4c:7d:4f:74: > 4d:ac:df:a8:67:98:d8:b1:fd:f7:c3:96:2b:15:1a:cf: > 3d:1d:ec:63:37:a7:52:34:42:82:66:2a:65:1f:37:91: > 7b:76:0b:f5:4a:ba:f7:ac:6e:6a:d2:0f:54:bf:e7:9e: > 55:4c:f7:0a:37:a9:70:8f:5e:e4:49:d9:42:51:4d:3d: > a2:5d:74:82:9d:24:98:0f:b0:cf:46:55:7e:c3:bb:8d: > 7d:27:6c:92:43:9c:75:0c:d6:c9:9a:97:04:36:22:0d > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > b0:ce:39:24:6b:c0:e3:fd:6e:69:99:65:b3:15:2c:d6: > 52:cb:b0:74:78:3f:26:19:ae:d3:0a:d5:fd:64:65:e3: > 81:73:bb:17:e8:08:8d:c5:c6:c8:bc:5b:f4:fb:08:2b: > d1:95:d7:5e:a4:a7:38:62:8b:8e:fe:d2:a8:2d:58:81: > b1:79:c3:da:48:ab:47:56:f5:29:d6:f8:c5:74:68:83: > 86:5b:07:0a:de:cc:3d:7b:2a:40:98:d8:08:16:8c:2e: > 5c:40:52:d3:b0:e5:1c:50:32:f4:b6:a2:b0:2d:d8:7b: > ca:76:fd:6b:47:35:21:34:49:34:b5:80:9d:bf:58:38 > Fingerprint (MD5): > 9E:C2:BE:C2:F5:75:06:9C:FE:88:E2:8A:8F:E0:51:D7 > Fingerprint (SHA1): > FB:76:AA:02:5C:A5:43:A8:25:B8:A9:A9:6B:13:BB:D3:7A:51:27:C4 >Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" >Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" >Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" >Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" >Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" >Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" >Returned value is 0, expected result is pass >chains.sh: #3732: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171879 (0x123fcfe7) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:18:46 2013 > Not After : Wed Mar 07 00:18:46 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:39:62:eb:96:36:d0:0a:70:c3:10:02:7b:30:2e:5f: > 2e:9b:ac:35:3a:9d:2c:f8:e5:79:82:f0:4c:7d:4f:74: > 4d:ac:df:a8:67:98:d8:b1:fd:f7:c3:96:2b:15:1a:cf: > 3d:1d:ec:63:37:a7:52:34:42:82:66:2a:65:1f:37:91: > 7b:76:0b:f5:4a:ba:f7:ac:6e:6a:d2:0f:54:bf:e7:9e: > 55:4c:f7:0a:37:a9:70:8f:5e:e4:49:d9:42:51:4d:3d: > a2:5d:74:82:9d:24:98:0f:b0:cf:46:55:7e:c3:bb:8d: > 7d:27:6c:92:43:9c:75:0c:d6:c9:9a:97:04:36:22:0d > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > b0:ce:39:24:6b:c0:e3:fd:6e:69:99:65:b3:15:2c:d6: > 52:cb:b0:74:78:3f:26:19:ae:d3:0a:d5:fd:64:65:e3: > 81:73:bb:17:e8:08:8d:c5:c6:c8:bc:5b:f4:fb:08:2b: > d1:95:d7:5e:a4:a7:38:62:8b:8e:fe:d2:a8:2d:58:81: > b1:79:c3:da:48:ab:47:56:f5:29:d6:f8:c5:74:68:83: > 86:5b:07:0a:de:cc:3d:7b:2a:40:98:d8:08:16:8c:2e: > 5c:40:52:d3:b0:e5:1c:50:32:f4:b6:a2:b0:2d:d8:7b: > ca:76:fd:6b:47:35:21:34:49:34:b5:80:9d:bf:58:38 > Fingerprint (MD5): > 9E:C2:BE:C2:F5:75:06:9C:FE:88:E2:8A:8F:E0:51:D7 > Fingerprint (SHA1): > FB:76:AA:02:5C:A5:43:A8:25:B8:A9:A9:6B:13:BB:D3:7A:51:27:C4 >Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" >Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" >Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" >Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" >Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" >Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" >Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" >Returned value is 0, expected result is pass >chains.sh: #3733: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der >vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3734: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED >chains.sh: Creating DB RootDB >certutil -N -d RootDB -f RootDB/dbpasswd >chains.sh: #3735: explicitPolicy: Creating DB RootDB - PASSED >chains.sh: Creating Root CA Root >certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171909 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3736: explicitPolicy: Creating Root CA Root - PASSED >chains.sh: Exporting Root CA Root.der >certutil -L -d RootDB -r -n Root -o Root.der >chains.sh: #3737: explicitPolicy: Exporting Root CA Root.der - PASSED >chains.sh: Creating DB nonEVCADB >certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd >chains.sh: #3738: explicitPolicy: Creating DB nonEVCADB - PASSED >chains.sh: Creating Intermediate certifiate request nonEVCAReq.der >certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3739: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED >chains.sh: Creating certficate nonEVCARoot.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 306171910 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3740: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED >chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database >certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der >chains.sh: #3741: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED >chains.sh: Creating DB EVCADB >certutil -N -d EVCADB -f EVCADB/dbpasswd >chains.sh: #3742: explicitPolicy: Creating DB EVCADB - PASSED >chains.sh: Creating Intermediate certifiate request EVCAReq.der >certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3743: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED >chains.sh: Creating certficate EVCARoot.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 306171911 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3744: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED >chains.sh: Importing certificate EVCARoot.der to EVCADB database >certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der >chains.sh: #3745: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED >chains.sh: Creating DB otherEVCADB >certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd >chains.sh: #3746: explicitPolicy: Creating DB otherEVCADB - PASSED >chains.sh: Creating Intermediate certifiate request otherEVCAReq.der >certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3747: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED >chains.sh: Creating certficate otherEVCARoot.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 306171912 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.2.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3748: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED >chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database >certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der >chains.sh: #3749: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED >chains.sh: Creating DB validEVDB >certutil -N -d validEVDB -f validEVDB/dbpasswd >chains.sh: #3750: explicitPolicy: Creating DB validEVDB - PASSED >chains.sh: Creating EE certifiate request validEVReq.der >certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3751: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED >chains.sh: Creating certficate validEVEVCA.der signed by EVCA >certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 306171913 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3752: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED >chains.sh: Importing certificate validEVEVCA.der to validEVDB database >certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der >chains.sh: #3753: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED >chains.sh: Creating DB invalidEVDB >certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd >chains.sh: #3754: explicitPolicy: Creating DB invalidEVDB - PASSED >chains.sh: Creating EE certifiate request invalidEVReq.der >certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3755: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED >chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA >certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 306171914 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3756: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED >chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database >certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der >chains.sh: #3757: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED >chains.sh: Creating DB wrongEVOIDDB >certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd >chains.sh: #3758: explicitPolicy: Creating DB wrongEVOIDDB - PASSED >chains.sh: Creating EE certifiate request wrongEVOIDReq.der >certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3759: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED >chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA >certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 306171915 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3760: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED >chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database >certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der >chains.sh: #3761: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #3762: explicitPolicy: Creating DB AllDB - PASSED >chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der >vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171909 (0x123fd005) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:18:55 2013 > Not After : Wed Mar 07 00:18:55 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c1:cb:81:57:87:b0:6b:0a:44:0d:11:9a:4b:da:33:63: > fb:67:9c:86:1f:1a:77:df:ee:88:28:f2:c0:0a:2b:f8: > f0:b7:dc:0b:6b:05:a6:d2:16:4e:9b:ca:0f:d4:30:bb: > 51:87:4a:63:bd:ad:2c:e5:b6:9c:a8:16:be:64:5b:43: > 2c:2d:8e:6e:fc:aa:87:b4:52:4d:98:ea:8a:4e:54:27: > 49:6e:cf:f0:59:d7:ce:b9:87:d9:04:51:57:d9:be:1a: > 52:22:ef:3c:2a:40:e1:ca:dd:73:f4:87:73:cc:ac:0d: > 00:74:28:4b:d9:7e:47:f8:55:5d:81:9a:84:f7:91:29 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2f:fc:64:f7:51:a3:22:da:1c:7e:fd:2e:7a:fe:4d:c1: > 11:86:fc:f6:d3:fd:1d:6c:ff:25:a1:e0:a4:d9:28:cd: > bf:61:b7:43:e8:0a:71:42:3c:06:ee:3e:36:64:7b:2f: > d2:d0:92:a8:85:00:d5:c6:f5:7b:56:e9:0d:1d:58:87: > b4:82:66:c7:b8:4a:95:66:47:43:ce:3f:1b:38:cd:03: > 19:96:02:d1:1f:12:ce:5c:95:54:a0:22:ab:20:29:2a: > 78:c5:73:dd:3a:60:a0:c1:e8:66:92:3f:3d:71:d8:d9: > 55:55:7a:74:55:43:18:cd:8c:c5:7f:ce:5f:85:de:61 > Fingerprint (MD5): > 57:6B:DA:0E:D1:64:8A:0B:90:70:8E:EA:01:F4:4B:7D > Fingerprint (SHA1): > 39:EB:16:5C:98:A0:9E:D2:5F:9D:94:D6:9B:60:16:4C:1A:09:A7:D6 >Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" >Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" >Returned value is 0, expected result is pass >chains.sh: #3763: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED >chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der >vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3764: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED >chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der >vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3765: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED >chains.sh: Importing certificate Root.der to AllDB database >certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der >chains.sh: #3766: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED >chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 >vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171909 (0x123fd005) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:18:55 2013 > Not After : Wed Mar 07 00:18:55 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c1:cb:81:57:87:b0:6b:0a:44:0d:11:9a:4b:da:33:63: > fb:67:9c:86:1f:1a:77:df:ee:88:28:f2:c0:0a:2b:f8: > f0:b7:dc:0b:6b:05:a6:d2:16:4e:9b:ca:0f:d4:30:bb: > 51:87:4a:63:bd:ad:2c:e5:b6:9c:a8:16:be:64:5b:43: > 2c:2d:8e:6e:fc:aa:87:b4:52:4d:98:ea:8a:4e:54:27: > 49:6e:cf:f0:59:d7:ce:b9:87:d9:04:51:57:d9:be:1a: > 52:22:ef:3c:2a:40:e1:ca:dd:73:f4:87:73:cc:ac:0d: > 00:74:28:4b:d9:7e:47:f8:55:5d:81:9a:84:f7:91:29 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 2f:fc:64:f7:51:a3:22:da:1c:7e:fd:2e:7a:fe:4d:c1: > 11:86:fc:f6:d3:fd:1d:6c:ff:25:a1:e0:a4:d9:28:cd: > bf:61:b7:43:e8:0a:71:42:3c:06:ee:3e:36:64:7b:2f: > d2:d0:92:a8:85:00:d5:c6:f5:7b:56:e9:0d:1d:58:87: > b4:82:66:c7:b8:4a:95:66:47:43:ce:3f:1b:38:cd:03: > 19:96:02:d1:1f:12:ce:5c:95:54:a0:22:ab:20:29:2a: > 78:c5:73:dd:3a:60:a0:c1:e8:66:92:3f:3d:71:d8:d9: > 55:55:7a:74:55:43:18:cd:8c:c5:7f:ce:5f:85:de:61 > Fingerprint (MD5): > 57:6B:DA:0E:D1:64:8A:0B:90:70:8E:EA:01:F4:4B:7D > Fingerprint (SHA1): > 39:EB:16:5C:98:A0:9E:D2:5F:9D:94:D6:9B:60:16:4C:1A:09:A7:D6 > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" >Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" >Returned value is 0, expected result is pass >chains.sh: #3767: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED >chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 >vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. Root [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3768: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED >chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 >vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. Root [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3769: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED >chains.sh: Creating DB RootDB >certutil -N -d RootDB -f RootDB/dbpasswd >chains.sh: #3770: Mapping: Creating DB RootDB - PASSED >chains.sh: Creating Root CA Root >certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171916 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3771: Mapping: Creating Root CA Root - PASSED >chains.sh: Exporting Root CA Root.der >certutil -L -d RootDB -r -n Root -o Root.der >chains.sh: #3772: Mapping: Exporting Root CA Root.der - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #3773: Mapping: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3774: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 306171917 --extCP --extPM < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >OID.1.0 >OID.1.1 >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] >Is this a critical extension [y/N]? >chains.sh: #3775: Mapping: Creating certficate CA1Root.der signed by Root - PASSED >chains.sh: Importing certificate CA1Root.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der >chains.sh: #3776: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #3777: Mapping: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3778: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 306171918 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.1 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3779: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA2CA1.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der >chains.sh: #3780: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED >chains.sh: Creating DB UserDB >certutil -N -d UserDB -f UserDB/dbpasswd >chains.sh: #3781: Mapping: Creating DB UserDB - PASSED >chains.sh: Creating EE certifiate request UserReq.der >certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3782: Mapping: Creating EE certifiate request UserReq.der - PASSED >chains.sh: Creating certficate UserCA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 306171919 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.1 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3783: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED >chains.sh: Importing certificate UserCA2.der to UserDB database >certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der >chains.sh: #3784: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #3785: Mapping: Creating DB AllDB - PASSED >chains.sh: Importing certificate Root.der to AllDB database >certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der >chains.sh: #3786: Mapping: Importing certificate Root.der to AllDB database - PASSED >chains.sh: Importing certificate CA1Root.der to AllDB database >certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der >chains.sh: #3787: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED >chains.sh: Importing certificate CA2CA1.der to AllDB database >certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der >chains.sh: #3788: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171916 (0x123fd00c) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:18:57 2013 > Not After : Wed Mar 07 00:18:57 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ba:61:ea:da:71:35:a1:74:18:85:07:fb:6a:f3:2c:b9: > 08:de:20:bc:f2:7a:cc:19:b4:6f:1e:f6:2b:8f:6d:54: > 52:2f:b6:f8:0d:e5:18:09:51:a6:3d:9e:f2:7a:3e:5f: > ea:47:14:de:d0:39:ad:90:68:cb:fb:6b:cd:1c:aa:78: > 50:56:1b:ef:f0:fa:c1:7a:11:e6:5c:60:5d:8d:ae:21: > 33:58:64:ca:18:37:0a:40:31:72:80:c5:53:b2:97:c3: > 8e:b8:b9:a3:bc:18:07:ee:fc:12:b2:5c:95:f3:07:d3: > 19:b8:7b:63:ab:5d:6c:8f:a9:87:aa:ac:5d:a9:56:19 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > a0:a0:69:b9:a2:c0:f7:f5:88:0f:9c:f4:22:17:9a:5a: > 6f:df:05:ba:51:e5:82:bc:1d:7a:b6:ce:ab:a5:71:cf: > d9:bb:19:87:64:75:f6:ab:b2:61:1a:a3:f3:3d:79:39: > 12:be:0a:ee:6c:c6:ea:6a:dd:10:ac:0a:6d:b1:2f:8d: > e5:c2:69:62:45:56:7b:a3:3a:f7:7e:85:a3:d9:eb:e5: > ff:5e:2e:88:3b:5f:69:01:22:05:ed:de:41:11:42:2d: > 3c:4f:41:d0:b9:a4:1d:14:8c:51:3d:bd:ca:8c:68:99: > 04:12:2d:b3:3b:ac:6a:c2:5f:1c:81:e5:a0:8e:1d:51 > Fingerprint (MD5): > A8:E0:5A:3C:FE:1E:DC:09:B1:AF:45:DC:31:45:5D:A5 > Fingerprint (SHA1): > 17:18:32:8D:15:44:D1:BC:A8:B0:84:71:A4:89:64:88:BE:E9:97:0A > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3789: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root >vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. Root [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3790: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. CA1 [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3791: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 >vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171917 (0x123fd00d) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:18:57 2013 > Not After : Wed Mar 07 00:18:57 2018 > Subject: "CN=CA1 Intermediate,O=CA1,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e9:12:71:a4:b6:0a:d9:96:c8:a8:18:38:df:71:5b:1f: > 13:42:32:89:d1:8d:87:74:3c:53:c8:a6:76:12:3d:60: > 5b:1f:0b:09:1a:2f:3c:8c:fa:24:70:ac:b2:7c:66:db: > bc:eb:12:3e:b5:8c:52:f2:3c:ec:43:fe:8e:d2:2f:1a: > e5:68:c4:f4:36:df:32:84:47:90:a4:46:9e:a3:a0:c9: > f9:88:37:c9:c6:27:45:6b:a4:06:92:4a:43:8b:ce:85: > ec:08:26:d5:70:f6:13:20:48:8f:0c:40:db:69:85:e8: > fa:19:3a:d8:fc:a5:f7:10:75:2d:74:92:4a:e9:e4:59 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policy Mappings > Data: Sequence { > Sequence { > OID.1.0 > User Defined Policy OID > } > } > Name: Certificate Policies > Data: > Policy Name: OID.1.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 22:03:c0:4f:08:22:dd:15:53:49:bd:7a:d3:71:87:e1: > 49:66:0b:95:0c:9e:89:a7:76:71:56:36:c1:92:c9:bf: > 9f:e0:cc:6f:20:00:68:a2:98:6d:27:12:a6:46:a9:1c: > 73:27:f3:a3:b9:29:47:a9:62:1c:59:cf:fe:fa:4c:de: > d2:2e:23:7a:46:99:0a:19:b0:6d:6d:b2:79:88:62:9b: > 9c:26:8d:39:e9:13:34:96:4c:c6:f8:96:49:c9:99:d9: > a7:8c:5f:81:63:90:78:13:47:c2:b8:ea:e2:07:a8:9a: > b5:ab:d2:8b:70:18:7e:5a:53:18:ed:a9:33:cf:3b:a2 > Fingerprint (MD5): > 1A:A3:8E:2F:AF:44:A7:7B:39:11:23:3D:D3:F9:21:A3 > Fingerprint (SHA1): > 99:63:8B:0B:83:B9:F5:05:28:1C:DA:D2:AD:4C:8B:0F:1D:EC:6A:76 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Returned value is 0, expected result is pass >chains.sh: #3792: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. CA2 [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3793: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED >chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 >vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171918 (0x123fd00e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:18:57 2013 > Not After : Wed Mar 07 00:18:57 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d8:ca:aa:7b:1c:07:1e:c0:54:a7:f4:b0:2d:f6:5a:17: > 96:3d:bb:1c:f1:a9:f6:a1:a1:ec:e3:b6:97:cb:d1:30: > f4:9d:73:02:4c:a5:c0:3b:67:b1:4d:b1:48:cc:19:86: > 23:3f:08:1d:1b:62:ed:32:d9:ab:29:41:31:16:d2:97: > 6b:5f:43:ad:6f:09:3e:7f:07:b4:86:05:5c:04:4e:48: > 46:a7:8c:78:6f:85:3c:a1:67:d2:e0:59:54:58:49:53: > 54:13:2b:92:70:c3:aa:53:c4:76:3b:3e:39:68:ab:58: > b6:ac:4c:32:40:be:74:56:3a:50:90:09:7c:bd:53:3b > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > e3:71:b2:6a:a1:c1:b1:f7:88:4f:d9:dc:e9:4f:69:97: > 53:65:d6:9c:b0:63:20:23:92:0a:21:31:68:58:15:51: > 95:ea:5e:4c:9f:8a:a4:a2:57:bb:8a:1e:a9:a7:bc:6c: > a9:9a:4c:e8:69:46:75:da:67:74:67:e6:00:7f:d2:11: > 8d:e3:08:f0:67:87:e8:e4:c8:c5:9e:da:c8:f7:15:99: > 7b:93:bb:fb:6e:e0:ad:fc:44:7f:c3:07:b1:8a:d4:69: > 98:10:8d:c8:20:33:dc:d7:31:5f:73:cb:78:59:97:51: > 81:14:e9:3c:e2:8d:b1:04:33:cf:8f:1d:bb:f7:66:49 > Fingerprint (MD5): > E5:FB:6A:E1:3D:E4:2C:21:84:AF:3A:5E:77:7B:15:18 > Fingerprint (SHA1): > C6:B5:BD:36:23:66:6D:8E:12:EC:A7:54:0B:46:C9:CD:AD:A1:27:59 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Returned value is 0, expected result is pass >chains.sh: #3794: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED >chains.sh: Creating DB RootDB >certutil -N -d RootDB -f RootDB/dbpasswd >chains.sh: #3795: Mapping2: Creating DB RootDB - PASSED >chains.sh: Creating Root CA Root >certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171920 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3796: Mapping2: Creating Root CA Root - PASSED >chains.sh: Exporting Root CA Root.der >certutil -L -d RootDB -r -n Root -o Root.der >chains.sh: #3797: Mapping2: Exporting Root CA Root.der - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #3798: Mapping2: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3799: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 306171921 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3800: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED >chains.sh: Importing certificate CA1Root.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der >chains.sh: #3801: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #3802: Mapping2: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3803: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 306171922 --extCP --extPM < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >n >n >OID.1.0 >OID.1.1 >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] >Is this a critical extension [y/N]? >chains.sh: #3804: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA2CA1.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der >chains.sh: #3805: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED >chains.sh: Creating DB CA3DB >certutil -N -d CA3DB -f CA3DB/dbpasswd >chains.sh: #3806: Mapping2: Creating DB CA3DB - PASSED >chains.sh: Creating Intermediate certifiate request CA3Req.der >certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3807: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED >chains.sh: Creating certficate CA3CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 306171923 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.1 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3808: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate CA3CA2.der to CA3DB database >certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der >chains.sh: #3809: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED >chains.sh: Creating DB UserDB >certutil -N -d UserDB -f UserDB/dbpasswd >chains.sh: #3810: Mapping2: Creating DB UserDB - PASSED >chains.sh: Creating EE certifiate request UserReq.der >certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3811: Mapping2: Creating EE certifiate request UserReq.der - PASSED >chains.sh: Creating certficate UserCA3.der signed by CA3 >certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 306171924 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.1 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3812: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED >chains.sh: Importing certificate UserCA3.der to UserDB database >certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der >chains.sh: #3813: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #3814: Mapping2: Creating DB AllDB - PASSED >chains.sh: Importing certificate Root.der to AllDB database >certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der >chains.sh: #3815: Mapping2: Importing certificate Root.der to AllDB database - PASSED >chains.sh: Importing certificate CA1Root.der to AllDB database >certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der >chains.sh: #3816: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED >chains.sh: Importing certificate CA2CA1.der to AllDB database >certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der >chains.sh: #3817: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED >chains.sh: Importing certificate CA3CA2.der to AllDB database >certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der >chains.sh: #3818: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED >chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171920 (0x123fd010) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:18:58 2013 > Not After : Wed Mar 07 00:18:58 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e4:a8:5e:d5:54:65:ab:64:52:ec:76:f3:f0:30:0e:d1: > 08:15:8a:ff:b9:aa:db:ca:1f:ad:32:21:e2:b8:26:a3: > 44:40:a4:be:ed:43:b2:97:6c:9b:db:26:74:35:a2:da: > d6:7b:c4:6f:54:56:c6:28:52:5b:63:c2:0b:2d:96:81: > 6f:64:a9:e6:a7:ef:c8:73:6a:d1:1a:fd:e4:97:23:27: > bc:34:7e:ba:62:b7:ef:82:cc:7f:99:bf:bf:2d:66:83: > 0e:c9:7d:be:df:b9:17:2d:0f:dc:2f:f0:f6:d8:0d:2a: > 48:f6:71:50:ad:0f:7a:17:97:26:c4:e9:4b:b2:57:2f > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > d8:0d:a4:81:05:df:aa:b9:1a:d1:30:7a:de:d5:f9:2e: > 82:d0:64:02:27:45:ac:7e:1d:5f:74:1f:c6:b2:82:ec: > 6e:2e:e7:c6:75:07:ac:7b:1a:97:63:e2:40:bc:61:16: > 7c:cd:3d:86:04:95:d2:57:92:21:2b:99:23:e0:65:62: > 61:2a:2c:bc:a0:f3:3c:b7:58:23:d6:05:08:98:dd:1b: > 61:9a:96:a5:f4:ba:44:dd:8d:ff:d2:77:e2:5a:37:52: > 0e:ea:29:22:60:4c:3b:c1:22:e1:cc:f6:07:d4:78:c4: > 98:49:c1:2a:f9:7f:be:96:e8:d2:97:03:5b:af:c4:6c > Fingerprint (MD5): > C7:9B:32:62:44:12:54:0E:F7:DC:27:FE:FD:AF:28:5A > Fingerprint (SHA1): > A3:F9:1B:16:CD:A5:48:99:B2:89:72:B2:92:0E:14:1C:96:3A:ED:CB > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" >Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3819: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root - PASSED >chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root >vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. Root [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3820: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root - PASSED >chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171921 (0x123fd011) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:18:58 2013 > Not After : Wed Mar 07 00:18:58 2018 > Subject: "CN=CA1 Intermediate,O=CA1,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ca:87:d7:d9:ba:03:d6:1e:7b:8d:2e:5c:bc:4f:c6:90: > 72:4d:37:74:70:1f:d6:cf:62:26:39:29:48:30:b7:54: > c0:21:1c:2a:2b:87:c9:94:b7:60:2d:d2:6c:14:6b:a8: > 23:9e:bb:ec:ac:44:6e:9d:7f:83:18:bc:90:ac:af:c2: > a8:0b:8a:fe:c1:b7:dd:50:6b:70:c3:a3:dc:1f:35:c2: > 78:e4:12:e6:1d:bb:ed:09:53:a3:a4:34:93:1a:49:f6: > 39:c9:39:10:d4:6e:b4:7a:64:3c:77:81:35:ad:1a:ca: > 65:b7:82:72:89:eb:07:e6:c1:2f:c9:7a:d9:74:16:8f > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policies > Data: > Policy Name: User Defined Policy OID > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > a3:cf:ba:06:e7:a0:df:00:53:c0:0d:92:f6:ec:65:16: > 84:0f:7f:7d:58:c8:05:e7:c8:bc:0b:65:63:73:bc:2a: > e4:63:43:0b:1e:2c:5c:80:73:f7:dd:3a:b6:b0:e6:2f: > 43:23:d6:49:b2:5e:5e:a1:ae:3b:e8:44:88:e7:91:d1: > bd:7c:c1:a0:b4:4f:5e:7d:ce:0a:51:d2:39:81:b0:3d: > 1b:23:50:43:52:cc:7b:68:e5:fd:ad:2a:06:33:24:42: > f3:78:32:46:7b:11:27:f0:af:d8:77:4c:ab:14:1d:14: > 8b:ce:4b:11:30:e7:3f:09:33:e1:53:b0:9d:00:4b:05 > Fingerprint (MD5): > 5A:4D:C2:63:5F:F9:30:CA:E3:77:3D:6C:5F:16:1F:07 > Fingerprint (SHA1): > 38:D0:DF:3D:A0:BF:15:7D:40:B8:F4:C4:CF:62:A8:5C:4B:D8:08:DE > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" >Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Returned value is 0, expected result is pass >chains.sh: #3821: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED >chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 >vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. CA1 [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3822: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED >chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 >vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. CA2 [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3823: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED >chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 >vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171922 (0x123fd012) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:18:58 2013 > Not After : Wed Mar 07 00:18:58 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ce:fe:22:04:ef:a5:94:09:6c:5c:93:0c:ec:bc:50:78: > 52:59:7a:18:d8:a7:f3:82:af:6c:04:a0:44:0f:52:30: > 21:48:90:3f:7f:49:f9:a4:83:00:0f:7e:7a:69:0a:3e: > 9f:80:24:20:29:7e:67:dd:98:b2:2c:7d:a3:16:8c:65: > 8a:7f:c0:dc:60:f4:f3:00:b8:b1:89:b4:31:c9:71:28: > b0:da:c2:f3:7a:15:5e:a8:66:cc:df:94:01:c2:ac:67: > dc:7d:42:99:59:f0:da:36:34:25:b0:56:45:8c:53:23: > 3b:97:06:32:f6:d0:30:23:67:e6:b5:df:27:6b:8c:bf > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: Certificate Policy Mappings > Data: Sequence { > Sequence { > OID.1.0 > User Defined Policy OID > } > } > Name: Certificate Policies > Data: > Policy Name: OID.1.0 > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 0c:67:90:4e:74:b4:82:e9:c4:02:c7:c4:bf:ab:bf:20: > 25:d1:ad:22:cc:f8:46:72:ac:71:17:6d:93:38:3a:8a: > 29:27:d6:a5:03:5e:33:a0:09:9b:d1:47:0c:84:ce:6e: > 2e:dc:9f:43:5d:ce:05:2b:03:39:c9:78:00:d3:1e:bf: > b2:02:e3:93:35:e2:e6:fc:d5:1e:65:85:3c:c1:45:0e: > 05:99:db:ed:d6:f8:6d:f6:3c:6f:ca:b5:36:26:19:6f: > b1:98:99:c2:a8:ae:53:63:b2:e5:67:d5:50:e1:81:3e: > ef:90:de:21:19:e7:20:1d:b5:02:f9:e7:39:a9:f9:d5 > Fingerprint (MD5): > 86:BC:1C:DC:7C:1D:DD:03:83:C1:C4:9A:05:80:8D:9F > Fingerprint (SHA1): > 00:88:99:53:44:AD:35:8D:B1:18:5E:08:06:C4:B9:39:5D:E4:38:C9 > Certificate Trust Flags: > SSL Flags: > Email Flags: > Object Signing Flags: >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" >Returned value is 0, expected result is pass >chains.sh: #3824: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED >chains.sh: Creating DB RootDB >certutil -N -d RootDB -f RootDB/dbpasswd >chains.sh: #3825: AIA: Creating DB RootDB - PASSED >chains.sh: Creating Root CA Root >certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171925 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3826: AIA: Creating Root CA Root - PASSED >chains.sh: Exporting Root CA Root.der >certutil -L -d RootDB -r -n Root -o Root.der >chains.sh: #3827: AIA: Exporting Root CA Root.der - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #3828: AIA: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3829: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 306171926 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3830: AIA: Creating certficate CA1Root.der signed by Root - PASSED >chains.sh: Importing certificate CA1Root.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der >chains.sh: #3831: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #3832: AIA: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3833: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 306171927 --extAIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA1Root-306171835.der >0 >n >n >=== >Enter access method type for Authority Information Access extension: > 1 - CA Issuers > 2 - OCSP > Anyother number to finish > Choice > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Add another location to the Authority Information Access extension [y/N] >Is this a critical extension [y/N]? >chains.sh: #3834: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA2CA1.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der >chains.sh: #3835: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED >chains.sh: Creating DB UserDB >certutil -N -d UserDB -f UserDB/dbpasswd >chains.sh: #3836: AIA: Creating DB UserDB - PASSED >chains.sh: Creating EE certifiate request UserReq.der >certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3837: AIA: Creating EE certifiate request UserReq.der - PASSED >chains.sh: Creating certficate UserCA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 306171928 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3838: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED >chains.sh: Importing certificate UserCA2.der to UserDB database >certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der >chains.sh: #3839: AIA: Importing certificate UserCA2.der to UserDB database - PASSED >chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der >vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=CA1 Intermediate,O=CA1,C=US >Returned value is 1, expected result is fail >chains.sh: #3840: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der - PASSED >chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -f -t Root.der >vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171925 (0x123fd015) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:19:00 2013 > Not After : Wed Mar 07 00:19:00 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > be:55:f3:b7:47:60:93:4e:7a:39:e0:be:97:f8:a9:6c: > 63:fa:b4:7a:f2:ad:82:a7:c4:3d:ed:36:c3:8b:55:c1: > 8d:10:de:30:4b:f5:a8:3d:e7:b6:7b:46:ab:8e:2a:7a: > 88:c0:b7:ce:83:9b:57:30:09:d7:25:86:8a:70:06:2a: > dd:ec:50:77:8e:40:ef:99:b7:f7:b1:1d:8e:6a:ae:ca: > 2f:d1:6b:e0:d5:de:a6:e1:b4:0e:ae:eb:cc:ae:74:4f: > 81:df:f9:1a:76:1d:4a:e5:5f:b9:db:f7:a2:1b:7d:d6: > 2b:ea:6f:a1:ca:a7:d8:48:91:44:b2:90:20:39:2a:57 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 02:52:f4:49:8f:2c:87:55:2c:1b:a7:34:46:a9:b7:89: > f9:72:f2:bf:20:a5:76:77:28:01:32:eb:7e:60:0b:9f: > cd:6e:b8:28:96:ec:e4:be:6a:65:ce:2f:73:9b:fb:92: > 82:ba:2a:71:f3:9d:c3:73:34:1d:b1:7c:fc:2b:ae:fe: > 98:a3:1c:0d:8f:7e:04:51:cc:35:98:01:e3:58:bc:13: > 67:7b:a1:40:8c:e0:ac:a6:0e:18:c1:37:27:b7:cc:4f: > 52:ab:7c:20:c5:e1:3b:8d:11:01:a7:23:ac:26:78:54: > 58:28:82:84:30:f1:5f:78:f1:b4:fe:f4:b9:45:76:2b > Fingerprint (MD5): > 99:85:A5:87:78:53:6B:B6:AA:99:40:D1:73:E1:3E:84 > Fingerprint (SHA1): > 8D:97:FB:A3:75:A5:75:A9:31:72:1D:03:85:D3:86:BB:75:09:3E:65 >Certificate 1 Subject: "CN=User EE,O=User,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #3841: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -f -t Root.der - PASSED >chains.sh: Creating DB ArmyDB >certutil -N -d ArmyDB -f ArmyDB/dbpasswd >chains.sh: #3842: BridgeWithAIA: Creating DB ArmyDB - PASSED >chains.sh: Creating Root CA Army >certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171929 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3843: BridgeWithAIA: Creating Root CA Army - PASSED >chains.sh: Exporting Root CA Army.der >certutil -L -d ArmyDB -r -n Army -o Army.der >chains.sh: #3844: BridgeWithAIA: Exporting Root CA Army.der - PASSED >chains.sh: Creating DB NavyDB >certutil -N -d NavyDB -f NavyDB/dbpasswd >chains.sh: #3845: BridgeWithAIA: Creating DB NavyDB - PASSED >chains.sh: Creating Root CA Navy >certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171930 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3846: BridgeWithAIA: Creating Root CA Navy - PASSED >chains.sh: Exporting Root CA Navy.der >certutil -L -d NavyDB -r -n Navy -o Navy.der >chains.sh: #3847: BridgeWithAIA: Exporting Root CA Navy.der - PASSED >chains.sh: Creating DB BridgeDB >certutil -N -d BridgeDB -f BridgeDB/dbpasswd >chains.sh: #3848: BridgeWithAIA: Creating DB BridgeDB - PASSED >chains.sh: Creating Bridge certifiate request BridgeReq.der >certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3849: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED >chains.sh: Creating certficate BridgeArmy.der signed by Army >certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 306171931 -7 Bridge@Army < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3850: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED >chains.sh: Importing certificate BridgeArmy.der to BridgeDB database >certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der >chains.sh: #3851: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED >chains.sh: Creating certficate BridgeNavy.der signed by Navy >certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 306171932 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3852: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED >chains.sh: Importing certificate BridgeNavy.der to BridgeDB database >certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der >chains.sh: #3853: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED >chains.sh: Generating PKCS7 package from BridgeDB database >cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 >chains.sh: #3854: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #3855: BridgeWithAIA: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3856: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Bridge.der signed by Bridge >certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 306171933 --extAIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-Bridge-306171836.p7 >0 >n >n >=== >Enter access method type for Authority Information Access extension: > 1 - CA Issuers > 2 - OCSP > Anyother number to finish > Choice > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Add another location to the Authority Information Access extension [y/N] >Is this a critical extension [y/N]? >chains.sh: #3857: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED >chains.sh: Importing certificate CA1Bridge.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der >chains.sh: #3858: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED >chains.sh: Creating DB EE1DB >certutil -N -d EE1DB -f EE1DB/dbpasswd >chains.sh: #3859: BridgeWithAIA: Creating DB EE1DB - PASSED >chains.sh: Creating EE certifiate request EE1Req.der >certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3860: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED >chains.sh: Creating certficate EE1CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 306171934 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3861: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate EE1CA1.der to EE1DB database >certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der >chains.sh: #3862: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Bridge Bridge,O=Bridge,C=US >Returned value is 1, expected result is fail >chains.sh: #3863: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Army.der >vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. bridge@navy [Certificate Authority]: >Email Address(es): bridge@navy > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Navy ROOT CA,O=Navy,C=US > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Navy ROOT CA,O=Navy,C=US >Returned value is 1, expected result is fail >chains.sh: #3864: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Navy.der >vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171930 (0x123fd01a) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:19:01 2013 > Not After : Wed Mar 07 00:19:01 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ce:c7:8c:98:11:95:47:90:77:60:47:c3:42:18:31:09: > a7:2c:48:07:29:44:99:c0:a3:bc:1c:64:bf:86:37:21: > 13:17:fd:04:de:35:d0:a3:ac:e2:f6:dc:fb:36:e6:8f: > b3:f5:28:9a:bd:20:b3:b6:70:d8:ba:23:e5:73:24:c0: > 35:0b:cb:be:39:e9:95:4f:83:9b:00:61:01:b0:b2:c8: > 6d:23:a0:cf:45:00:92:26:2a:36:92:69:67:5b:dd:cb: > 65:5c:89:04:9e:ac:b9:6f:6d:6d:fa:22:a3:39:ae:df: > 49:66:e2:e3:c2:43:a8:99:90:82:6d:89:bd:52:de:b3 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 5e:64:f7:eb:91:e4:7e:5e:27:9c:f8:8a:f1:29:2a:54: > e4:bf:f7:40:35:4e:16:ff:73:2d:c4:5d:e9:ce:02:c5: > b2:68:bd:e9:ca:5f:1a:ac:6d:43:37:f0:2d:63:cc:76: > 1e:75:a3:86:ac:68:77:aa:f8:ec:21:74:d4:04:1e:32: > 82:52:4f:a6:85:78:fc:75:80:17:87:6e:23:ac:bb:c6: > 99:52:a3:25:f2:3d:8b:23:70:d9:a9:b0:61:66:8f:b6: > 90:81:23:7b:a9:d1:2c:a0:91:35:8d:44:fc:2d:cd:da: > 94:a4:68:30:62:58:3b:fb:92:fb:1b:a6:ff:50:79:d7 > Fingerprint (MD5): > C6:1B:06:25:DC:98:60:20:63:94:6E:C1:F5:D2:06:7A > Fingerprint (SHA1): > F6:88:BB:17:1D:D8:ED:DE:F2:FD:78:50:90:3E:B9:D1:39:0B:8B:95 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #3865: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Navy.der >vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171930 (0x123fd01a) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:19:01 2013 > Not After : Wed Mar 07 00:19:01 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ce:c7:8c:98:11:95:47:90:77:60:47:c3:42:18:31:09: > a7:2c:48:07:29:44:99:c0:a3:bc:1c:64:bf:86:37:21: > 13:17:fd:04:de:35:d0:a3:ac:e2:f6:dc:fb:36:e6:8f: > b3:f5:28:9a:bd:20:b3:b6:70:d8:ba:23:e5:73:24:c0: > 35:0b:cb:be:39:e9:95:4f:83:9b:00:61:01:b0:b2:c8: > 6d:23:a0:cf:45:00:92:26:2a:36:92:69:67:5b:dd:cb: > 65:5c:89:04:9e:ac:b9:6f:6d:6d:fa:22:a3:39:ae:df: > 49:66:e2:e3:c2:43:a8:99:90:82:6d:89:bd:52:de:b3 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 5e:64:f7:eb:91:e4:7e:5e:27:9c:f8:8a:f1:29:2a:54: > e4:bf:f7:40:35:4e:16:ff:73:2d:c4:5d:e9:ce:02:c5: > b2:68:bd:e9:ca:5f:1a:ac:6d:43:37:f0:2d:63:cc:76: > 1e:75:a3:86:ac:68:77:aa:f8:ec:21:74:d4:04:1e:32: > 82:52:4f:a6:85:78:fc:75:80:17:87:6e:23:ac:bb:c6: > 99:52:a3:25:f2:3d:8b:23:70:d9:a9:b0:61:66:8f:b6: > 90:81:23:7b:a9:d1:2c:a0:91:35:8d:44:fc:2d:cd:da: > 94:a4:68:30:62:58:3b:fb:92:fb:1b:a6:ff:50:79:d7 > Fingerprint (MD5): > C6:1B:06:25:DC:98:60:20:63:94:6E:C1:F5:D2:06:7A > Fingerprint (SHA1): > F6:88:BB:17:1D:D8:ED:DE:F2:FD:78:50:90:3E:B9:D1:39:0B:8B:95 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #3866: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Navy.der - PASSED >chains.sh: Creating DB ArmyDB >certutil -N -d ArmyDB -f ArmyDB/dbpasswd >chains.sh: #3867: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED >chains.sh: Creating Root CA Army >certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171935 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3868: BridgeWithHalfAIA: Creating Root CA Army - PASSED >chains.sh: Exporting Root CA Army.der >certutil -L -d ArmyDB -r -n Army -o Army.der >chains.sh: #3869: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED >chains.sh: Creating DB NavyDB >certutil -N -d NavyDB -f NavyDB/dbpasswd >chains.sh: #3870: BridgeWithHalfAIA: Creating DB NavyDB - PASSED >chains.sh: Creating Root CA Navy >certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171936 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3871: BridgeWithHalfAIA: Creating Root CA Navy - PASSED >chains.sh: Exporting Root CA Navy.der >certutil -L -d NavyDB -r -n Navy -o Navy.der >chains.sh: #3872: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED >chains.sh: Creating DB BridgeDB >certutil -N -d BridgeDB -f BridgeDB/dbpasswd >chains.sh: #3873: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED >chains.sh: Creating Bridge certifiate request BridgeReq.der >certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3874: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED >chains.sh: Creating certficate BridgeArmy.der signed by Army >certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 306171937 -7 Bridge@Army < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3875: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED >chains.sh: Importing certificate BridgeArmy.der to BridgeDB database >certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der >chains.sh: #3876: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED >chains.sh: Creating certficate BridgeNavy.der signed by Navy >certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 306171938 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3877: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED >chains.sh: Importing certificate BridgeNavy.der to BridgeDB database >certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der >chains.sh: #3878: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED >chains.sh: Generating PKCS7 package from BridgeDB database >cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 >chains.sh: #3879: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #3880: BridgeWithHalfAIA: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3881: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Bridge.der signed by Bridge >certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 306171939 --extAIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-Bridge-306171837.p7 >0 >n >n >=== >Enter access method type for Authority Information Access extension: > 1 - CA Issuers > 2 - OCSP > Anyother number to finish > Choice > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Add another location to the Authority Information Access extension [y/N] >Is this a critical extension [y/N]? >chains.sh: #3882: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED >chains.sh: Importing certificate CA1Bridge.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der >chains.sh: #3883: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED >chains.sh: Creating DB EE1DB >certutil -N -d EE1DB -f EE1DB/dbpasswd >chains.sh: #3884: BridgeWithHalfAIA: Creating DB EE1DB - PASSED >chains.sh: Creating EE certifiate request EE1Req.der >certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3885: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED >chains.sh: Creating certficate EE1CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 306171940 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3886: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate EE1CA1.der to EE1DB database >certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der >chains.sh: #3887: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #3888: BridgeWithHalfAIA: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3889: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2Bridge.der signed by Bridge >certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 306171941 --extAIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-BridgeNavy-306171838.der >0 >n >n >=== >Enter access method type for Authority Information Access extension: > 1 - CA Issuers > 2 - OCSP > Anyother number to finish > Choice > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Add another location to the Authority Information Access extension [y/N] >Is this a critical extension [y/N]? >chains.sh: #3890: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED >chains.sh: Importing certificate CA2Bridge.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der >chains.sh: #3891: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED >chains.sh: Creating DB EE2DB >certutil -N -d EE2DB -f EE2DB/dbpasswd >chains.sh: #3892: BridgeWithHalfAIA: Creating DB EE2DB - PASSED >chains.sh: Creating EE certifiate request EE2Req.der >certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3893: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED >chains.sh: Creating certficate EE2CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 306171942 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3894: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate EE2CA2.der to EE2DB database >certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der >chains.sh: #3895: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der >vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Bridge Bridge,O=Bridge,C=US >Returned value is 1, expected result is fail >chains.sh: #3896: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Army.der >vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. bridge@navy [Certificate Authority]: >Email Address(es): bridge@navy > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Navy ROOT CA,O=Navy,C=US > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=Navy ROOT CA,O=Navy,C=US >Returned value is 1, expected result is fail >chains.sh: #3897: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Navy.der >vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171936 (0x123fd020) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:19:03 2013 > Not After : Wed Mar 07 00:19:03 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d1:53:cd:f9:9c:4c:3b:ac:ce:a8:c3:08:81:5b:e7:73: > 7d:9a:cd:a2:74:1f:18:17:27:64:2b:46:7a:22:99:9f: > a8:49:19:f3:de:4b:62:08:d2:59:89:a7:9e:90:50:2d: > da:22:c4:15:bf:22:6f:22:6a:98:f6:7e:a4:c7:0a:73: > df:d3:46:17:2b:dc:52:98:fa:b2:88:1d:b5:0f:bd:22: > 2d:b8:56:42:fc:ca:8b:1f:6e:1e:35:af:79:9c:2b:31: > af:30:9e:a2:05:7f:6e:86:4a:3c:df:c2:e1:7b:30:71: > d3:89:b4:50:b8:0c:f3:80:1a:ac:b9:a8:a4:5b:3a:c7 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 33:b4:21:4e:2e:bb:3c:9c:56:fd:81:07:0c:bc:bf:bc: > 76:15:9e:12:f7:fb:21:82:8f:9a:d6:db:d7:27:34:3d: > 40:3d:5b:2e:c0:5c:56:ba:4f:29:b9:7c:d6:75:1b:2a: > 22:57:40:6e:14:f6:49:1c:8b:da:ca:1f:22:ea:03:4e: > 75:b7:2e:77:75:a7:34:69:57:58:f7:07:2c:6c:24:46: > 5d:7a:9d:23:a7:da:bb:8d:e7:8c:72:56:ab:34:99:62: > aa:73:54:72:46:96:c6:53:68:6b:53:47:e0:c9:7b:cf: > b5:ca:fd:51:5c:f7:fd:36:05:8c:7e:ba:34:ec:39:af > Fingerprint (MD5): > 26:29:6C:5B:F9:5B:05:AD:E6:DC:6C:95:00:CD:C0:48 > Fingerprint (SHA1): > DE:80:AC:3C:0E:DE:BE:5C:02:76:90:CA:DE:3A:2D:53:AB:5F:BE:3B >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #3898: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Navy.der >vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171936 (0x123fd020) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:19:03 2013 > Not After : Wed Mar 07 00:19:03 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d1:53:cd:f9:9c:4c:3b:ac:ce:a8:c3:08:81:5b:e7:73: > 7d:9a:cd:a2:74:1f:18:17:27:64:2b:46:7a:22:99:9f: > a8:49:19:f3:de:4b:62:08:d2:59:89:a7:9e:90:50:2d: > da:22:c4:15:bf:22:6f:22:6a:98:f6:7e:a4:c7:0a:73: > df:d3:46:17:2b:dc:52:98:fa:b2:88:1d:b5:0f:bd:22: > 2d:b8:56:42:fc:ca:8b:1f:6e:1e:35:af:79:9c:2b:31: > af:30:9e:a2:05:7f:6e:86:4a:3c:df:c2:e1:7b:30:71: > d3:89:b4:50:b8:0c:f3:80:1a:ac:b9:a8:a4:5b:3a:c7 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 33:b4:21:4e:2e:bb:3c:9c:56:fd:81:07:0c:bc:bf:bc: > 76:15:9e:12:f7:fb:21:82:8f:9a:d6:db:d7:27:34:3d: > 40:3d:5b:2e:c0:5c:56:ba:4f:29:b9:7c:d6:75:1b:2a: > 22:57:40:6e:14:f6:49:1c:8b:da:ca:1f:22:ea:03:4e: > 75:b7:2e:77:75:a7:34:69:57:58:f7:07:2c:6c:24:46: > 5d:7a:9d:23:a7:da:bb:8d:e7:8c:72:56:ab:34:99:62: > aa:73:54:72:46:96:c6:53:68:6b:53:47:e0:c9:7b:cf: > b5:ca:fd:51:5c:f7:fd:36:05:8c:7e:ba:34:ec:39:af > Fingerprint (MD5): > 26:29:6C:5B:F9:5B:05:AD:E6:DC:6C:95:00:CD:C0:48 > Fingerprint (SHA1): > DE:80:AC:3C:0E:DE:BE:5C:02:76:90:CA:DE:3A:2D:53:AB:5F:BE:3B >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #3899: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -f -t Army.der >vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 0. CN=EE2 EE,O=EE2,C=US : > ERROR -8179: Peer's Certificate issuer is not recognized. > CN=CA2 Intermediate,O=CA2,C=US >Returned value is 1, expected result is fail >chains.sh: #3900: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -f -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Army.der >vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171935 (0x123fd01f) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Army ROOT CA,O=Army,C=US" > Validity: > Not Before: Thu Mar 07 00:19:02 2013 > Not After : Wed Mar 07 00:19:02 2063 > Subject: "CN=Army ROOT CA,O=Army,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > cf:2f:43:4a:bd:b5:1d:99:9f:0b:4c:c1:86:a6:90:c5: > 77:f1:62:55:93:00:be:45:44:da:dc:b6:c0:9c:cf:0c: > 5b:b1:3a:85:68:d0:fd:f0:7b:6c:03:e5:59:27:f7:52: > d0:6a:8d:64:b7:e6:da:9e:83:a1:23:f1:51:63:44:f8: > 63:6c:af:ca:c9:65:3c:10:14:82:7a:cb:b7:ec:54:60: > 09:59:cd:38:70:29:98:4e:f4:82:71:40:1c:5f:be:bd: > 6b:b3:71:85:9c:43:cd:a0:9f:91:4a:b3:26:d1:06:a8: > 68:92:fd:e8:0b:52:4a:1f:a3:7e:ba:37:9c:21:c2:7d > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 27:c2:d8:04:94:c4:c6:f3:b5:0c:d3:32:c7:d8:9b:37: > b1:91:9b:00:98:92:6a:21:06:2c:b2:23:67:cd:61:b3: > 71:18:6c:58:35:fc:d8:d7:bb:0e:7b:8b:2a:b5:dc:7b: > 24:6f:77:26:a5:e2:5f:ae:c0:9a:1d:72:7f:93:80:fb: > 47:71:69:da:ef:82:67:18:ea:af:fc:4f:10:01:3c:33: > 6e:d9:24:33:37:a2:f1:3e:43:91:96:99:7e:06:f5:45: > c4:08:5b:8f:f0:d3:c5:04:35:24:c5:28:d2:0a:68:38: > ed:61:a4:56:29:33:cb:9d:25:bf:b6:b6:9a:1c:32:16 > Fingerprint (MD5): > EC:9D:C6:F3:92:1C:B9:4B:F0:CB:5E:D9:2D:88:00:D6 > Fingerprint (SHA1): > B9:41:0E:5E:3B:D2:B4:9F:81:53:4C:3A:14:D0:70:18:F7:77:BB:C9 >Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #3901: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -f -t Navy.der >vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171936 (0x123fd020) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:19:03 2013 > Not After : Wed Mar 07 00:19:03 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d1:53:cd:f9:9c:4c:3b:ac:ce:a8:c3:08:81:5b:e7:73: > 7d:9a:cd:a2:74:1f:18:17:27:64:2b:46:7a:22:99:9f: > a8:49:19:f3:de:4b:62:08:d2:59:89:a7:9e:90:50:2d: > da:22:c4:15:bf:22:6f:22:6a:98:f6:7e:a4:c7:0a:73: > df:d3:46:17:2b:dc:52:98:fa:b2:88:1d:b5:0f:bd:22: > 2d:b8:56:42:fc:ca:8b:1f:6e:1e:35:af:79:9c:2b:31: > af:30:9e:a2:05:7f:6e:86:4a:3c:df:c2:e1:7b:30:71: > d3:89:b4:50:b8:0c:f3:80:1a:ac:b9:a8:a4:5b:3a:c7 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 33:b4:21:4e:2e:bb:3c:9c:56:fd:81:07:0c:bc:bf:bc: > 76:15:9e:12:f7:fb:21:82:8f:9a:d6:db:d7:27:34:3d: > 40:3d:5b:2e:c0:5c:56:ba:4f:29:b9:7c:d6:75:1b:2a: > 22:57:40:6e:14:f6:49:1c:8b:da:ca:1f:22:ea:03:4e: > 75:b7:2e:77:75:a7:34:69:57:58:f7:07:2c:6c:24:46: > 5d:7a:9d:23:a7:da:bb:8d:e7:8c:72:56:ab:34:99:62: > aa:73:54:72:46:96:c6:53:68:6b:53:47:e0:c9:7b:cf: > b5:ca:fd:51:5c:f7:fd:36:05:8c:7e:ba:34:ec:39:af > Fingerprint (MD5): > 26:29:6C:5B:F9:5B:05:AD:E6:DC:6C:95:00:CD:C0:48 > Fingerprint (SHA1): > DE:80:AC:3C:0E:DE:BE:5C:02:76:90:CA:DE:3A:2D:53:AB:5F:BE:3B >Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #3902: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -f -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Navy.der >vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171936 (0x123fd020) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:19:03 2013 > Not After : Wed Mar 07 00:19:03 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d1:53:cd:f9:9c:4c:3b:ac:ce:a8:c3:08:81:5b:e7:73: > 7d:9a:cd:a2:74:1f:18:17:27:64:2b:46:7a:22:99:9f: > a8:49:19:f3:de:4b:62:08:d2:59:89:a7:9e:90:50:2d: > da:22:c4:15:bf:22:6f:22:6a:98:f6:7e:a4:c7:0a:73: > df:d3:46:17:2b:dc:52:98:fa:b2:88:1d:b5:0f:bd:22: > 2d:b8:56:42:fc:ca:8b:1f:6e:1e:35:af:79:9c:2b:31: > af:30:9e:a2:05:7f:6e:86:4a:3c:df:c2:e1:7b:30:71: > d3:89:b4:50:b8:0c:f3:80:1a:ac:b9:a8:a4:5b:3a:c7 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 33:b4:21:4e:2e:bb:3c:9c:56:fd:81:07:0c:bc:bf:bc: > 76:15:9e:12:f7:fb:21:82:8f:9a:d6:db:d7:27:34:3d: > 40:3d:5b:2e:c0:5c:56:ba:4f:29:b9:7c:d6:75:1b:2a: > 22:57:40:6e:14:f6:49:1c:8b:da:ca:1f:22:ea:03:4e: > 75:b7:2e:77:75:a7:34:69:57:58:f7:07:2c:6c:24:46: > 5d:7a:9d:23:a7:da:bb:8d:e7:8c:72:56:ab:34:99:62: > aa:73:54:72:46:96:c6:53:68:6b:53:47:e0:c9:7b:cf: > b5:ca:fd:51:5c:f7:fd:36:05:8c:7e:ba:34:ec:39:af > Fingerprint (MD5): > 26:29:6C:5B:F9:5B:05:AD:E6:DC:6C:95:00:CD:C0:48 > Fingerprint (SHA1): > DE:80:AC:3C:0E:DE:BE:5C:02:76:90:CA:DE:3A:2D:53:AB:5F:BE:3B >Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Returned value is 0, expected result is pass >chains.sh: #3903: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Navy.der - PASSED >chains.sh: Creating DB ArmyDB >certutil -N -d ArmyDB -f ArmyDB/dbpasswd >chains.sh: #3904: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED >chains.sh: Creating Root CA Army >certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171943 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3905: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED >chains.sh: Exporting Root CA Army.der >certutil -L -d ArmyDB -r -n Army -o Army.der >chains.sh: #3906: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED >chains.sh: Creating DB NavyDB >certutil -N -d NavyDB -f NavyDB/dbpasswd >chains.sh: #3907: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED >chains.sh: Creating Root CA Navy >certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171944 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3908: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED >chains.sh: Exporting Root CA Navy.der >certutil -L -d NavyDB -r -n Navy -o Navy.der >chains.sh: #3909: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED >chains.sh: Creating DB CAArmyDB >certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd >chains.sh: #3910: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED >chains.sh: Creating Intermediate certifiate request CAArmyReq.der >certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3911: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED >chains.sh: Creating certficate CAArmyArmy.der signed by Army >certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 306171945 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >y >OID.1.1 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3912: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED >chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database >certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der >chains.sh: #3913: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED >chains.sh: Creating DB CANavyDB >certutil -N -d CANavyDB -f CANavyDB/dbpasswd >chains.sh: #3914: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED >chains.sh: Creating Intermediate certifiate request CANavyReq.der >certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3915: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED >chains.sh: Creating certficate CANavyNavy.der signed by Navy >certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 306171946 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.2.0 >1 >n >y >OID.2.1 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3916: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED >chains.sh: Importing certificate CANavyNavy.der to CANavyDB database >certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der >chains.sh: #3917: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED >chains.sh: Creating DB BridgeDB >certutil -N -d BridgeDB -f BridgeDB/dbpasswd >chains.sh: #3918: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED >chains.sh: Creating Bridge certifiate request BridgeReq.der >certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3919: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED >chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy >certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 306171947 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >y >OID.1.1 >1 >n >n >n >OID.1.1 >OID.2.1 >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] >Is this a critical extension [y/N]? >chains.sh: #3920: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED >chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database >certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der >chains.sh: #3921: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED >chains.sh: Creating certficate BridgeCANavy.der signed by CANavy >certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 306171948 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.2.0 >1 >n >y >OID.2.1 >1 >n >n >n >OID.2.1 >OID.1.1 >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] >Is this a critical extension [y/N]? >chains.sh: #3922: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED >chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database >certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der >chains.sh: #3923: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED >chains.sh: Generating PKCS7 package from BridgeDB database >cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 >chains.sh: #3924: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #3925: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3926: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Bridge.der signed by Bridge >certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 306171949 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.1 >1 >n >y >OID.2.1 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3927: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED >chains.sh: Importing certificate CA1Bridge.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der >chains.sh: #3928: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #3929: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3930: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2Bridge.der signed by Bridge >certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 306171950 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.1.0 >1 >n >y >OID.2.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3931: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED >chains.sh: Importing certificate CA2Bridge.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der >chains.sh: #3932: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED >chains.sh: Creating DB EE1DB >certutil -N -d EE1DB -f EE1DB/dbpasswd >chains.sh: #3933: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED >chains.sh: Creating EE certifiate request EE1Req.der >certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3934: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED >chains.sh: Creating certficate EE1CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 306171951 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.2.1 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3935: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate EE1CA1.der to EE1DB database >certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der >chains.sh: #3936: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED >chains.sh: Creating DB EE2DB >certutil -N -d EE2DB -f EE2DB/dbpasswd >chains.sh: #3937: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED >chains.sh: Creating EE certifiate request EE2Req.der >certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3938: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED >chains.sh: Creating certficate EE2CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 306171952 --extCP < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >OID.2.0 >1 >n >n >n >=== >Enter a CertPolicy Object Identifier (dotted decimal format) >or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 > 1 - CPS Pointer qualifier > 2 - User notice qualifier > Any other number to finish > Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] >Enter another PolicyInformation field [y/N]? >Is this a critical extension [y/N]? >chains.sh: #3939: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate EE2CA2.der to EE2DB database >certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der >chains.sh: #3940: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der >vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3941: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der >vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171943 (0x123fd027) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Army ROOT CA,O=Army,C=US" > Validity: > Not Before: Thu Mar 07 00:19:05 2013 > Not After : Wed Mar 07 00:19:05 2063 > Subject: "CN=Army ROOT CA,O=Army,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > ca:73:12:48:23:6d:e8:38:bd:3c:04:2c:e5:8a:4f:9c: > ff:5b:5b:cb:07:fe:d9:4a:74:0d:f9:21:dd:8b:8f:49: > 2a:7e:a7:02:fc:4c:f8:38:63:52:66:db:40:42:72:82: > 8d:23:bb:5b:dd:07:2a:d7:ce:61:df:d7:74:ce:2a:73: > e6:af:50:4a:a7:13:bc:26:f7:41:84:fb:51:59:27:f5: > 09:c8:95:65:a6:16:48:80:bf:b4:a5:a3:3f:97:f8:36: > dc:35:e1:88:13:f0:49:de:2b:6e:8f:33:72:87:82:68: > 9a:7c:ab:b1:4e:bf:19:4c:ef:16:76:75:e0:86:2f:cd > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:5c:8c:40:30:f2:6b:5c:ac:5d:0e:15:ab:c6:f3:cf: > 9e:00:67:9d:1a:6b:38:6e:5c:ba:9b:d5:54:6e:7b:b0: > 02:5b:4b:58:3e:4b:b3:93:23:d6:af:bf:0d:f4:4c:45: > b2:2f:f4:ce:8d:0a:bd:5b:e6:02:46:e7:3f:e2:0d:8a: > ae:05:66:75:ed:d6:aa:23:c7:29:d9:c0:f1:69:5f:29: > 60:cb:b6:ee:67:10:a6:9b:d6:7f:df:11:82:5d:7f:33: > e4:de:ea:39:e9:2a:e9:e3:83:60:95:dc:98:4e:ec:2b: > 49:78:00:48:4c:99:84:3b:58:62:93:db:92:35:e8:69 > Fingerprint (MD5): > A5:41:0A:1B:85:CF:FA:BB:7A:3B:6C:EA:3E:55:D4:A9 > Fingerprint (SHA1): > 43:EC:F2:65:95:B1:46:79:F3:32:5A:C6:0D:C7:5E:BE:70:16:CA:D0 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" >Returned value is 0, expected result is pass >chains.sh: #3942: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der >vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3943: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der >vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3944: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der >vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3945: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der >vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3946: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der >vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3947: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der >vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3948: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der >vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3949: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der >vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3950: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der >vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171944 (0x123fd028) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Navy ROOT CA,O=Navy,C=US" > Validity: > Not Before: Thu Mar 07 00:19:05 2013 > Not After : Wed Mar 07 00:19:05 2063 > Subject: "CN=Navy ROOT CA,O=Navy,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d1:22:36:96:53:cb:52:fb:7a:c3:22:9e:82:78:44:40: > e2:18:3e:ec:fb:f1:7e:5f:79:4b:64:c9:ee:2c:14:61: > 46:65:07:ec:1a:30:0a:ec:a0:d3:4a:d4:c3:24:2f:6f: > f9:4e:d1:2e:00:84:f4:31:da:1a:ba:1c:db:53:6c:b1: > 0d:a3:bb:73:58:f6:df:69:27:68:8d:1f:e4:ca:8d:21: > bb:69:8c:b7:f7:21:8a:ef:0f:22:d3:6e:b7:70:4b:0e: > 6c:3e:cd:49:22:86:17:db:10:45:d9:d1:db:d7:ef:5c: > 43:96:d7:df:62:d1:7e:de:25:c8:f9:bd:36:a4:98:cf > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 46:87:65:1c:d3:02:72:08:71:85:f8:fc:ed:46:7b:6c: > c1:97:d6:46:01:83:9c:a6:70:27:f4:10:8b:34:01:19: > 9e:ad:c7:79:37:89:1b:21:78:e7:f5:d4:ce:88:7b:f6: > ca:c2:68:67:a0:0c:15:cc:4b:86:21:04:80:fe:31:e1: > c5:e8:e8:a4:96:b8:db:e7:7e:d5:bd:7a:d5:c4:25:f6: > 8e:30:50:d7:17:75:a8:e2:06:14:cc:bc:f0:21:48:65: > 1d:a1:42:ec:cb:e0:b1:02:46:1b:12:1b:51:94:25:7a: > c4:87:2e:a5:cb:9b:57:27:13:14:de:7c:b9:f6:b8:ba > Fingerprint (MD5): > 02:05:20:C9:5B:29:6B:17:2D:06:8E:6D:C6:AD:70:C3 > Fingerprint (SHA1): > 1D:77:A9:8F:61:8E:AA:2B:92:E5:EE:EF:FB:34:53:DD:72:EE:69:55 >Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" >Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" >Returned value is 0, expected result is pass >chains.sh: #3951: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der >vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3952: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der >vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3953: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der >vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3954: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der >vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3955: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der >vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: > ERROR -8032: Cert chain fails policy validation >Returned value is 1, expected result is fail >chains.sh: #3956: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #3957: RealCerts: Creating DB AllDB - PASSED >chains.sh: Importing certificate TestCA.ca.cert to AllDB database >certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert >chains.sh: #3958: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED >chains.sh: Importing certificate TestUser50.cert to AllDB database >certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert >chains.sh: #3959: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED >chains.sh: Importing certificate TestUser51.cert to AllDB database >certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert >chains.sh: #3960: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED >chains.sh: Importing certificate PayPalRootCA.cert to AllDB database >certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert >chains.sh: #3961: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED >chains.sh: Importing certificate PayPalICA.cert to AllDB database >certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert >chains.sh: #3962: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED >chains.sh: Importing certificate PayPalEE.cert to AllDB database >certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert >chains.sh: #3963: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED >chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database >certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert >chains.sh: #3964: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED >chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB >vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Wed Mar 19 21:04:25 2008 > Not After : Tue Mar 19 21:04:25 2058 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: > fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: > 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: > c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: > a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: > a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: > 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: > aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: > 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: > 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: > 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: > 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: > 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: > 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: > f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 > Fingerprint (MD5): > 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 > Fingerprint (SHA1): > 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo > untain View,ST=California,C=US" >Returned value is 0, expected result is pass >chains.sh: #3965: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB - PASSED >chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB >vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Wed Mar 19 21:04:25 2008 > Not After : Tue Mar 19 21:04:25 2058 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: > fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: > 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: > c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: > a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: > a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: > 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: > aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: > 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: > 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: > 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: > 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: > 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: > 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: > f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 > Fingerprint (MD5): > 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 > Fingerprint (SHA1): > 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo > untain View,ST=California,C=US" >Returned value is 0, expected result is pass >chains.sh: #3966: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB - PASSED >chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 >vfychain -d AllDB -pp -vv -o OID.2.16.840.1.113733.1.7.23.6 /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig > n, Inc.",C=US" > Validity: > Not Before: Wed Nov 08 00:00:00 2006 > Not After : Sun Nov 07 23:59:59 2021 > Subject: "CN=VeriSign Class 3 Public Primary Certification Authority > - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve > riSign Trust Network,O="VeriSign, Inc.",C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc: > 7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64: > 85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42: > b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec: > ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3: > 62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b: > 9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f: > e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db: > 7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af: > 1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a: > b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7: > ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74: > 24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4: > 8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95: > ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f: > 73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Name: CRL Distribution Points > Distribution point: > URI: "http://crl.verisign.com/pca3.crl" > Name: Certificate Key Usage > Critical: True > Usages: Certificate Signing > CRL Signing > Name: OID.1.3.6.1.5.5.7.1.12 > Data: Sequence { > [1]: { > [0]: { > Sequence { > Sequence { > Sequence { > "image/gif" > Sequence { > Sequence { > Sequence { > SHA-1 > } > 8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf: > 80:6a:d4:48:18:2c:7b:19:2e > } > } > Sequence { > "http://logo.verisign.com/vslogo.gif" > } > } > } > } > } > } > } > Name: Certificate Policies > Data: > Policy Name: Certificate Policies AnyPolicy > Policy Qualifier Name: PKIX CPS Pointer Qualifier > Policy Qualifier Data: "https://www.verisign.com/cps" > Name: Certificate Subject Key ID > Data: > 7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02: > af:33:31:33 > Name: Certificate Authority Key Identifier > Issuer: > Directory Name: "OU=Class 3 Public Primary Certification Auth > ority,O="VeriSign, Inc.",C=US" > Serial Number: > 70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a: > f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31: > 47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c: > d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0: > ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d: > 5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a: > 84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1: > d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6 > Fingerprint (MD5): > C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C > Fingerprint (SHA1): > 87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13 > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc > .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C= > US,serialNumber=3014267,businessCategory=Private Organization,incorporati > onState=Delaware,incorporationCountry=US" >Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter > ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network > ,O="VeriSign, Inc.",C=US" >Returned value is 0, expected result is pass >chains.sh: #3967: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 - PASSED >chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB >vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 0. BrAirWaysBadSig : > ERROR -8181: Peer's Certificate has expired. >Returned value is 1, expected result is fail >chains.sh: #3968: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB - PASSED >chains.sh: Creating DB RootDB >certutil -N -d RootDB -f RootDB/dbpasswd >chains.sh: #3969: DSA: Creating DB RootDB - PASSED >chains.sh: Creating Root CA Root >certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171953 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #3970: DSA: Creating Root CA Root - PASSED >chains.sh: Exporting Root CA Root.der >certutil -L -d RootDB -r -n Root -o Root.der >chains.sh: #3971: DSA: Exporting Root CA Root.der - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #3972: DSA: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3973: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 306171954 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3974: DSA: Creating certficate CA1Root.der signed by Root - PASSED >chains.sh: Importing certificate CA1Root.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der >chains.sh: #3975: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED >chains.sh: Creating DB EE1DB >certutil -N -d EE1DB -f EE1DB/dbpasswd >chains.sh: #3976: DSA: Creating DB EE1DB - PASSED >chains.sh: Creating EE certifiate request EE1Req.der >certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3977: DSA: Creating EE certifiate request EE1Req.der - PASSED >chains.sh: Creating certficate EE1CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 306171955 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3978: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate EE1CA1.der to EE1DB database >certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der >chains.sh: #3979: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #3980: DSA: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3981: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 306171956 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3982: DSA: Creating certficate CA2Root.der signed by Root - PASSED >chains.sh: Importing certificate CA2Root.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der >chains.sh: #3983: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED >chains.sh: Creating DB EE2DB >certutil -N -d EE2DB -f EE2DB/dbpasswd >chains.sh: #3984: DSA: Creating DB EE2DB - PASSED >chains.sh: Creating EE certifiate request EE2Req.der >certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3985: DSA: Creating EE certifiate request EE2Req.der - PASSED >chains.sh: Creating certficate EE2CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 306171957 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3986: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate EE2CA2.der to EE2DB database >certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der >chains.sh: #3987: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED >chains.sh: Creating DB CA3DB >certutil -N -d CA3DB -f CA3DB/dbpasswd >chains.sh: #3988: DSA: Creating DB CA3DB - PASSED >chains.sh: Creating Intermediate certifiate request CA3Req.der >certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3989: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED >chains.sh: Creating certficate CA3Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 306171958 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3990: DSA: Creating certficate CA3Root.der signed by Root - PASSED >chains.sh: Importing certificate CA3Root.der to CA3DB database >certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der >chains.sh: #3991: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED >chains.sh: Creating DB EE3DB >certutil -N -d EE3DB -f EE3DB/dbpasswd >chains.sh: #3992: DSA: Creating DB EE3DB - PASSED >chains.sh: Creating EE certifiate request EE3Req.der >certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #3993: DSA: Creating EE certifiate request EE3Req.der - PASSED >chains.sh: Creating certficate EE3CA3.der signed by CA3 >certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 306171959 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3994: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED >chains.sh: Importing certificate EE3CA3.der to EE3DB database >certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der >chains.sh: #3995: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED >chains.sh: Creating DB CA4DB >certutil -N -d CA4DB -f CA4DB/dbpasswd >chains.sh: #3996: DSA: Creating DB CA4DB - PASSED >chains.sh: Creating Intermediate certifiate request CA4Req.der >certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #3997: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED >chains.sh: Creating certficate CA4Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 306171960 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #3998: DSA: Creating certficate CA4Root.der signed by Root - PASSED >chains.sh: Importing certificate CA4Root.der to CA4DB database >certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der >chains.sh: #3999: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED >chains.sh: Creating DB EE4DB >certutil -N -d EE4DB -f EE4DB/dbpasswd >chains.sh: #4000: DSA: Creating DB EE4DB - PASSED >chains.sh: Creating EE certifiate request EE4Req.der >certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #4001: DSA: Creating EE certifiate request EE4Req.der - PASSED >chains.sh: Creating certficate EE4CA4.der signed by CA4 >certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 306171961 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #4002: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED >chains.sh: Importing certificate EE4CA4.der to EE4DB database >certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der >chains.sh: #4003: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #4004: DSA: Creating DB AllDB - PASSED >chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der >vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171953 (0x123fd031) > Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:19:08 2013 > Not After : Wed Mar 07 00:19:08 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: ANSI X9.57 DSA Signature > Args: > 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: > db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: > c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: > 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: > fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: > 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: > c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: > 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: > ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: > 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: > 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: > 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: > f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: > 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: > da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: > 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: > 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: > f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: > a5:10 > DSA Public Key: > Prime: > 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: > b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: > 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: > af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: > 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: > af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: > c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: > 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d > Subprime: > b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: > 76:27:03:81 > Base: > 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: > 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: > f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: > 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: > 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: > 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: > 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: > 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 > PublicValue: > 1b:a9:36:04:4c:60:eb:ec:74:14:95:7c:b5:95:b9:4b: > e1:96:e1:ef:b7:42:20:6a:a8:41:ca:83:36:a2:be:5b: > 22:89:57:f1:a7:45:3e:f5:3c:4a:82:f9:e5:c3:87:83: > bb:73:9c:63:fe:46:cd:ae:72:c2:8a:4f:b5:af:45:10: > 6c:5f:5d:58:41:4a:33:40:77:d6:10:b6:b4:e6:62:da: > 57:cf:1e:f9:cb:25:32:98:10:43:84:ff:48:43:0b:e5: > 16:2f:7a:85:87:e1:a2:a3:0a:77:17:3d:fc:67:c0:9d: > 76:9f:9c:4c:0a:f1:b9:a1:5e:17:f1:31:46:1a:db:f3 > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest > Signature: > 30:2c:02:14:71:f8:f0:bc:5b:a4:ff:61:a4:61:5d:23: > 66:3f:38:83:4c:2e:7d:de:02:14:36:4d:42:23:f1:64: > a9:14:b3:29:25:72:78:90:02:68:d9:73:0d:26 > Fingerprint (MD5): > 17:50:FF:00:B0:E8:EB:CE:5C:A7:49:BB:C7:80:92:27 > Fingerprint (SHA1): > D5:E7:9D:2D:53:47:6D:82:6D:CD:90:51:99:FA:F8:98:27:BD:3F:13 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #4005: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der - PASSED >chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der >vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171953 (0x123fd031) > Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:19:08 2013 > Not After : Wed Mar 07 00:19:08 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: ANSI X9.57 DSA Signature > Args: > 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: > db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: > c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: > 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: > fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: > 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: > c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: > 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: > ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: > 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: > 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: > 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: > f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: > 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: > da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: > 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: > 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: > f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: > a5:10 > DSA Public Key: > Prime: > 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: > b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: > 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: > af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: > 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: > af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: > c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: > 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d > Subprime: > b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: > 76:27:03:81 > Base: > 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: > 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: > f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: > 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: > 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: > 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: > 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: > 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 > PublicValue: > 1b:a9:36:04:4c:60:eb:ec:74:14:95:7c:b5:95:b9:4b: > e1:96:e1:ef:b7:42:20:6a:a8:41:ca:83:36:a2:be:5b: > 22:89:57:f1:a7:45:3e:f5:3c:4a:82:f9:e5:c3:87:83: > bb:73:9c:63:fe:46:cd:ae:72:c2:8a:4f:b5:af:45:10: > 6c:5f:5d:58:41:4a:33:40:77:d6:10:b6:b4:e6:62:da: > 57:cf:1e:f9:cb:25:32:98:10:43:84:ff:48:43:0b:e5: > 16:2f:7a:85:87:e1:a2:a3:0a:77:17:3d:fc:67:c0:9d: > 76:9f:9c:4c:0a:f1:b9:a1:5e:17:f1:31:46:1a:db:f3 > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest > Signature: > 30:2c:02:14:71:f8:f0:bc:5b:a4:ff:61:a4:61:5d:23: > 66:3f:38:83:4c:2e:7d:de:02:14:36:4d:42:23:f1:64: > a9:14:b3:29:25:72:78:90:02:68:d9:73:0d:26 > Fingerprint (MD5): > 17:50:FF:00:B0:E8:EB:CE:5C:A7:49:BB:C7:80:92:27 > Fingerprint (SHA1): > D5:E7:9D:2D:53:47:6D:82:6D:CD:90:51:99:FA:F8:98:27:BD:3F:13 >Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Returned value is 0, expected result is pass >chains.sh: #4006: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der - PASSED >chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der >vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171953 (0x123fd031) > Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:19:08 2013 > Not After : Wed Mar 07 00:19:08 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: ANSI X9.57 DSA Signature > Args: > 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: > db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: > c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: > 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: > fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: > 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: > c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: > 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: > ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: > 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: > 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: > 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: > f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: > 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: > da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: > 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: > 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: > f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: > a5:10 > DSA Public Key: > Prime: > 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: > b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: > 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: > af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: > 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: > af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: > c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: > 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d > Subprime: > b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: > 76:27:03:81 > Base: > 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: > 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: > f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: > 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: > 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: > 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: > 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: > 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 > PublicValue: > 1b:a9:36:04:4c:60:eb:ec:74:14:95:7c:b5:95:b9:4b: > e1:96:e1:ef:b7:42:20:6a:a8:41:ca:83:36:a2:be:5b: > 22:89:57:f1:a7:45:3e:f5:3c:4a:82:f9:e5:c3:87:83: > bb:73:9c:63:fe:46:cd:ae:72:c2:8a:4f:b5:af:45:10: > 6c:5f:5d:58:41:4a:33:40:77:d6:10:b6:b4:e6:62:da: > 57:cf:1e:f9:cb:25:32:98:10:43:84:ff:48:43:0b:e5: > 16:2f:7a:85:87:e1:a2:a3:0a:77:17:3d:fc:67:c0:9d: > 76:9f:9c:4c:0a:f1:b9:a1:5e:17:f1:31:46:1a:db:f3 > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest > Signature: > 30:2c:02:14:71:f8:f0:bc:5b:a4:ff:61:a4:61:5d:23: > 66:3f:38:83:4c:2e:7d:de:02:14:36:4d:42:23:f1:64: > a9:14:b3:29:25:72:78:90:02:68:d9:73:0d:26 > Fingerprint (MD5): > 17:50:FF:00:B0:E8:EB:CE:5C:A7:49:BB:C7:80:92:27 > Fingerprint (SHA1): > D5:E7:9D:2D:53:47:6D:82:6D:CD:90:51:99:FA:F8:98:27:BD:3F:13 >Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" >Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" >Returned value is 0, expected result is pass >chains.sh: #4007: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der - PASSED >chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der >vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171953 (0x123fd031) > Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:19:08 2013 > Not After : Wed Mar 07 00:19:08 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: ANSI X9.57 DSA Signature > Args: > 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: > db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: > c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: > 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: > fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: > 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: > c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: > 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: > ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: > 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: > 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: > 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: > f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: > 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: > da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: > 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: > 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: > f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: > a5:10 > DSA Public Key: > Prime: > 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: > b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: > 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: > af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: > 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: > af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: > c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: > 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d > Subprime: > b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: > 76:27:03:81 > Base: > 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: > 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: > f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: > 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: > 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: > 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: > 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: > 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 > PublicValue: > 1b:a9:36:04:4c:60:eb:ec:74:14:95:7c:b5:95:b9:4b: > e1:96:e1:ef:b7:42:20:6a:a8:41:ca:83:36:a2:be:5b: > 22:89:57:f1:a7:45:3e:f5:3c:4a:82:f9:e5:c3:87:83: > bb:73:9c:63:fe:46:cd:ae:72:c2:8a:4f:b5:af:45:10: > 6c:5f:5d:58:41:4a:33:40:77:d6:10:b6:b4:e6:62:da: > 57:cf:1e:f9:cb:25:32:98:10:43:84:ff:48:43:0b:e5: > 16:2f:7a:85:87:e1:a2:a3:0a:77:17:3d:fc:67:c0:9d: > 76:9f:9c:4c:0a:f1:b9:a1:5e:17:f1:31:46:1a:db:f3 > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest > Signature: > 30:2c:02:14:71:f8:f0:bc:5b:a4:ff:61:a4:61:5d:23: > 66:3f:38:83:4c:2e:7d:de:02:14:36:4d:42:23:f1:64: > a9:14:b3:29:25:72:78:90:02:68:d9:73:0d:26 > Fingerprint (MD5): > 17:50:FF:00:B0:E8:EB:CE:5C:A7:49:BB:C7:80:92:27 > Fingerprint (SHA1): > D5:E7:9D:2D:53:47:6D:82:6D:CD:90:51:99:FA:F8:98:27:BD:3F:13 >Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" >Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" >Returned value is 0, expected result is pass >chains.sh: #4008: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der - PASSED >chains.sh: Creating DB RootDB >certutil -N -d RootDB -f RootDB/dbpasswd >chains.sh: #4009: Revocation: Creating DB RootDB - PASSED >chains.sh: Creating Root CA Root >certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #4010: Revocation: Creating Root CA Root - PASSED >chains.sh: Exporting Root CA Root.der >certutil -L -d RootDB -r -n Root -o Root.der >chains.sh: #4011: Revocation: Exporting Root CA Root.der - PASSED >chains.sh: Creating DB CA0DB >certutil -N -d CA0DB -f CA0DB/dbpasswd >chains.sh: #4012: Revocation: Creating DB CA0DB - PASSED >chains.sh: Creating Intermediate certifiate request CA0Req.der >certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #4013: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED >chains.sh: Creating certficate CA0Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #4014: Revocation: Creating certficate CA0Root.der signed by Root - PASSED >chains.sh: Importing certificate CA0Root.der to CA0DB database >certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der >chains.sh: #4015: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #4016: Revocation: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #4017: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1CA0.der signed by CA0 >certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #4018: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED >chains.sh: Importing certificate CA1CA0.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der >chains.sh: #4019: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED >chains.sh: Creating DB EE11DB >certutil -N -d EE11DB -f EE11DB/dbpasswd >chains.sh: #4020: Revocation: Creating DB EE11DB - PASSED >chains.sh: Creating EE certifiate request EE11Req.der >certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #4021: Revocation: Creating EE certifiate request EE11Req.der - PASSED >chains.sh: Creating certficate EE11CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #4022: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate EE11CA1.der to EE11DB database >certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der >chains.sh: #4023: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED >chains.sh: Creating DB EE12DB >certutil -N -d EE12DB -f EE12DB/dbpasswd >chains.sh: #4024: Revocation: Creating DB EE12DB - PASSED >chains.sh: Creating EE certifiate request EE12Req.der >certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #4025: Revocation: Creating EE certifiate request EE12Req.der - PASSED >chains.sh: Creating certficate EE12CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #4026: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate EE12CA1.der to EE12DB database >certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der >chains.sh: #4027: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #4028: Revocation: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #4029: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2CA0.der signed by CA0 >certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #4030: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED >chains.sh: Importing certificate CA2CA0.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der >chains.sh: #4031: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED >chains.sh: Creating DB EE21DB >certutil -N -d EE21DB -f EE21DB/dbpasswd >chains.sh: #4032: Revocation: Creating DB EE21DB - PASSED >chains.sh: Creating EE certifiate request EE21Req.der >certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #4033: Revocation: Creating EE certifiate request EE21Req.der - PASSED >chains.sh: Creating certficate EE21CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #4034: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate EE21CA2.der to EE21DB database >certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der >chains.sh: #4035: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED >chains.sh: Create CRL for RootDB >crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl >=== Crlutil input data === >update=20130307001912Z >nextupdate=20140307001912Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > This Update: Thu Mar 07 00:19:12 2013 > Next Update: Fri Mar 07 00:19:12 2014 > CRL Extensions: >chains.sh: #4036: Revocation: Create CRL for RootDB - PASSED >chains.sh: Create CRL for CA0DB >crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl >=== Crlutil input data === >update=20130307001912Z >nextupdate=20140307001912Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA0 Intermediate,O=CA0,C=US" > This Update: Thu Mar 07 00:19:12 2013 > Next Update: Fri Mar 07 00:19:12 2014 > CRL Extensions: >chains.sh: #4037: Revocation: Create CRL for CA0DB - PASSED >chains.sh: Create CRL for CA1DB >crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl >=== Crlutil input data === >update=20130307001912Z >nextupdate=20140307001912Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > This Update: Thu Mar 07 00:19:12 2013 > Next Update: Fri Mar 07 00:19:12 2014 > CRL Extensions: >chains.sh: #4038: Revocation: Create CRL for CA1DB - PASSED >chains.sh: Create CRL for CA2DB >crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl >=== Crlutil input data === >update=20130307001912Z >nextupdate=20140307001912Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA2 Intermediate,O=CA2,C=US" > This Update: Thu Mar 07 00:19:12 2013 > Next Update: Fri Mar 07 00:19:12 2014 > CRL Extensions: >chains.sh: #4039: Revocation: Create CRL for CA2DB - PASSED >chains.sh: Revoking certificate with SN 14 issued by CA1 >crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl >=== Crlutil input data === >update=20130307001913Z >addcert 14 20130307001913Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > This Update: Thu Mar 07 00:19:13 2013 > Next Update: Fri Mar 07 00:19:12 2014 > Entry 1 (0x1): > Serial Number: 14 (0xe) > Revocation Date: Thu Mar 07 00:19:13 2013 > CRL Extensions: >chains.sh: #4040: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED >chains.sh: Revoking certificate with SN 15 issued by CA0 >crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl >=== Crlutil input data === >update=20130307001914Z >addcert 15 20130307001914Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA0 Intermediate,O=CA0,C=US" > This Update: Thu Mar 07 00:19:14 2013 > Next Update: Fri Mar 07 00:19:12 2014 > Entry 1 (0x1): > Serial Number: 15 (0xf) > Revocation Date: Thu Mar 07 00:19:14 2013 > CRL Extensions: >chains.sh: #4041: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #4042: Revocation: Creating DB AllDB - PASSED >chains.sh: Importing certificate Root.der to AllDB database >certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der >chains.sh: #4043: Revocation: Importing certificate Root.der to AllDB database - PASSED >chains.sh: Importing CRL Root.crl to AllDB database >crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl >chains.sh: #4044: Revocation: Importing CRL Root.crl to AllDB database - PASSED >chains.sh: Importing certificate CA0Root.der to AllDB database >certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der >chains.sh: #4045: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED >chains.sh: Importing CRL CA0.crl to AllDB database >crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl >chains.sh: #4046: Revocation: Importing CRL CA0.crl to AllDB database - PASSED >chains.sh: Importing certificate CA1CA0.der to AllDB database >certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der >chains.sh: #4047: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED >chains.sh: Importing CRL CA1.crl to AllDB database >crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl >chains.sh: #4048: Revocation: Importing CRL CA1.crl to AllDB database - PASSED >chains.sh: Importing certificate CA2CA0.der to AllDB database >certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der >chains.sh: #4049: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED >chains.sh: Importing CRL CA2.crl to AllDB database >crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl >chains.sh: #4050: Revocation: Importing CRL CA2.crl to AllDB database - PASSED >chains.sh: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der >vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 10 (0xa) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:19:10 2013 > Not After : Wed Mar 07 00:19:10 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > db:15:d9:fe:fb:7e:d4:42:cb:51:0c:ec:65:50:cf:c5: > af:0a:e0:81:ce:b2:d3:0e:3b:84:e8:bf:ac:1e:e7:37: > d6:d1:75:2d:4d:d5:16:6b:e2:b6:a7:86:2c:d4:68:0c: > ee:7d:78:a7:43:64:f1:72:78:fb:dc:ae:96:ed:7d:3e: > 0e:11:1d:96:e6:d3:a1:80:9a:54:fe:6c:08:9b:e7:78: > e4:44:a5:bd:aa:ba:69:23:6a:01:c7:01:12:2b:e3:11: > 2a:35:68:20:f2:6f:7a:f7:3f:b4:09:86:5a:70:d9:2a: > 13:d3:8c:c4:46:3d:75:11:20:65:2c:4f:15:aa:d3:c1 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > c2:6f:3c:56:76:18:3d:c2:d8:d3:53:ea:16:a0:c5:f9: > e4:b9:a8:44:38:d3:7d:53:2c:e6:17:ef:1a:e9:44:07: > 2b:d5:11:d6:88:db:b1:0b:4a:d5:08:3c:0c:10:fa:fb: > af:83:91:d1:d6:75:94:5c:29:f8:6d:40:e7:e6:49:f8: > 7e:35:63:8f:22:69:e5:50:ca:db:a0:fb:51:13:52:d6: > cc:d1:f4:53:cd:13:5b:29:0f:61:6a:ca:97:09:4a:6c: > b3:7e:1a:11:43:e8:72:c0:2e:30:bd:77:f6:2c:0f:7e: > 62:be:ff:6e:f9:f8:0d:75:ab:74:1d:16:8d:ee:ff:1d > Fingerprint (MD5): > CA:16:EB:40:B9:77:E9:B7:63:C4:9D:93:9F:2A:68:6D > Fingerprint (SHA1): > 9A:38:8B:EE:00:F2:50:EB:E8:AB:E1:D3:78:B8:EC:5D:16:BF:F9:99 > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" >Returned value is 0, expected result is pass >chains.sh: #4051: Revocation: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED >chains.sh: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der >vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. Root [Certificate Authority]: > ERROR -8180: Peer's Certificate has been revoked. >Returned value is 1, expected result is fail >chains.sh: #4052: Revocation: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED >chains.sh: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der >vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 10 (0xa) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:19:10 2013 > Not After : Wed Mar 07 00:19:10 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > db:15:d9:fe:fb:7e:d4:42:cb:51:0c:ec:65:50:cf:c5: > af:0a:e0:81:ce:b2:d3:0e:3b:84:e8:bf:ac:1e:e7:37: > d6:d1:75:2d:4d:d5:16:6b:e2:b6:a7:86:2c:d4:68:0c: > ee:7d:78:a7:43:64:f1:72:78:fb:dc:ae:96:ed:7d:3e: > 0e:11:1d:96:e6:d3:a1:80:9a:54:fe:6c:08:9b:e7:78: > e4:44:a5:bd:aa:ba:69:23:6a:01:c7:01:12:2b:e3:11: > 2a:35:68:20:f2:6f:7a:f7:3f:b4:09:86:5a:70:d9:2a: > 13:d3:8c:c4:46:3d:75:11:20:65:2c:4f:15:aa:d3:c1 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > c2:6f:3c:56:76:18:3d:c2:d8:d3:53:ea:16:a0:c5:f9: > e4:b9:a8:44:38:d3:7d:53:2c:e6:17:ef:1a:e9:44:07: > 2b:d5:11:d6:88:db:b1:0b:4a:d5:08:3c:0c:10:fa:fb: > af:83:91:d1:d6:75:94:5c:29:f8:6d:40:e7:e6:49:f8: > 7e:35:63:8f:22:69:e5:50:ca:db:a0:fb:51:13:52:d6: > cc:d1:f4:53:cd:13:5b:29:0f:61:6a:ca:97:09:4a:6c: > b3:7e:1a:11:43:e8:72:c0:2e:30:bd:77:f6:2c:0f:7e: > 62:be:ff:6e:f9:f8:0d:75:ab:74:1d:16:8d:ee:ff:1d > Fingerprint (MD5): > CA:16:EB:40:B9:77:E9:B7:63:C4:9D:93:9F:2A:68:6D > Fingerprint (SHA1): > 9A:38:8B:EE:00:F2:50:EB:E8:AB:E1:D3:78:B8:EC:5D:16:BF:F9:99 > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" >Returned value is 0, expected result is pass >chains.sh: #4053: Revocation: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED >chains.sh: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der >vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. Root [Certificate Authority]: > ERROR -8180: Peer's Certificate has been revoked. >Returned value is 1, expected result is fail >chains.sh: #4054: Revocation: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED >chains.sh: Creating DB RootDB >certutil -N -d RootDB -f RootDB/dbpasswd >chains.sh: #4055: CRLDP: Creating DB RootDB - PASSED >chains.sh: Creating Root CA Root >certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171962 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #4056: CRLDP: Creating Root CA Root - PASSED >chains.sh: Exporting Root CA Root.der >certutil -L -d RootDB -r -n Root -o Root.der >chains.sh: #4057: CRLDP: Exporting Root CA Root.der - PASSED >chains.sh: Creating DB CA0DB >certutil -N -d CA0DB -f CA0DB/dbpasswd >chains.sh: #4058: CRLDP: Creating DB CA0DB - PASSED >chains.sh: Creating Intermediate certifiate request CA0Req.der >certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #4059: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED >chains.sh: Creating certficate CA0Root.der signed by Root >certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 306171963 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #4060: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED >chains.sh: Importing certificate CA0Root.der to CA0DB database >certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der >chains.sh: #4061: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #4062: CRLDP: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA0-306171851.crl >-1 >-1 >-1 >n >n >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >Enter the type of the distribution point name: > 1 - Full Name > 2 - Relative Name > Any other number to finish > Choice: > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Select one of the following for the reason flags > 0 - unused > 1 - keyCompromise > 2 - caCompromise > 3 - affiliationChanged > 4 - superseded > 5 - cessationOfOperation > 6 - certificateHold > Any other number to finish Choice: > Enter value for the CRL Issuer name: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? >Is this a critical extension [y/N]? >chains.sh: #4063: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1CA0.der signed by CA0 >certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA0Root-306171839.der >0 >n >n >=== >Enter access method type for Authority Information Access extension: > 1 - CA Issuers > 2 - OCSP > Anyother number to finish > Choice > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Add another location to the Authority Information Access extension [y/N] >Is this a critical extension [y/N]? >chains.sh: #4064: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED >chains.sh: Importing certificate CA1CA0.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der >chains.sh: #4065: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED >chains.sh: Creating DB EE11DB >certutil -N -d EE11DB -f EE11DB/dbpasswd >chains.sh: #4066: CRLDP: Creating DB EE11DB - PASSED >chains.sh: Creating EE certifiate request EE11Req.der >certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA0-306171851.crl >-1 >-1 >-1 >n >n >=== >Generating key. This may take a few moments... >Enter the type of the distribution point name: > 1 - Full Name > 2 - Relative Name > Any other number to finish > Choice: > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Select one of the following for the reason flags > 0 - unused > 1 - keyCompromise > 2 - caCompromise > 3 - affiliationChanged > 4 - superseded > 5 - cessationOfOperation > 6 - certificateHold > Any other number to finish Choice: > Enter value for the CRL Issuer name: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? >Is this a critical extension [y/N]? >chains.sh: #4067: CRLDP: Creating EE certifiate request EE11Req.der - PASSED >chains.sh: Creating certficate EE11CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 306171964 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #4068: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate EE11CA1.der to EE11DB database >certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der >chains.sh: #4069: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #4070: CRLDP: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA0-306171851.crl >-1 >-1 >-1 >n >n >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >Enter the type of the distribution point name: > 1 - Full Name > 2 - Relative Name > Any other number to finish > Choice: > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Select one of the following for the reason flags > 0 - unused > 1 - keyCompromise > 2 - caCompromise > 3 - affiliationChanged > 4 - superseded > 5 - cessationOfOperation > 6 - certificateHold > Any other number to finish Choice: > Enter value for the CRL Issuer name: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? >Is this a critical extension [y/N]? >chains.sh: #4071: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2CA0.der signed by CA0 >certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA0Root-306171840.der >0 >n >n >=== >Enter access method type for Authority Information Access extension: > 1 - CA Issuers > 2 - OCSP > Anyother number to finish > Choice > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Add another location to the Authority Information Access extension [y/N] >Is this a critical extension [y/N]? >chains.sh: #4072: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED >chains.sh: Importing certificate CA2CA0.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der >chains.sh: #4073: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED >chains.sh: Creating DB EE21DB >certutil -N -d EE21DB -f EE21DB/dbpasswd >chains.sh: #4074: CRLDP: Creating DB EE21DB - PASSED >chains.sh: Creating EE certifiate request EE21Req.der >certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #4075: CRLDP: Creating EE certifiate request EE21Req.der - PASSED >chains.sh: Creating certficate EE21CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 306171965 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #4076: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate EE21CA2.der to EE21DB database >certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der >chains.sh: #4077: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED >chains.sh: Creating DB EE1DB >certutil -N -d EE1DB -f EE1DB/dbpasswd >chains.sh: #4078: CRLDP: Creating DB EE1DB - PASSED >chains.sh: Creating EE certifiate request EE1Req.der >certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA0-306171851.crl >-1 >-1 >-1 >n >n >=== >Generating key. This may take a few moments... >Enter the type of the distribution point name: > 1 - Full Name > 2 - Relative Name > Any other number to finish > Choice: > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Select one of the following for the reason flags > 0 - unused > 1 - keyCompromise > 2 - caCompromise > 3 - affiliationChanged > 4 - superseded > 5 - cessationOfOperation > 6 - certificateHold > Any other number to finish Choice: > Enter value for the CRL Issuer name: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? >Is this a critical extension [y/N]? >chains.sh: #4079: CRLDP: Creating EE certifiate request EE1Req.der - PASSED >chains.sh: Creating certficate EE1CA0.der signed by CA0 >certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA0Root-306171841.der >0 >n >n >=== >Enter access method type for Authority Information Access extension: > 1 - CA Issuers > 2 - OCSP > Anyother number to finish > Choice > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Add another location to the Authority Information Access extension [y/N] >Is this a critical extension [y/N]? >chains.sh: #4080: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED >chains.sh: Importing certificate EE1CA0.der to EE1DB database >certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der >chains.sh: #4081: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED >chains.sh: Creating DB EE2DB >certutil -N -d EE2DB -f EE2DB/dbpasswd >chains.sh: #4082: CRLDP: Creating DB EE2DB - PASSED >chains.sh: Creating EE certifiate request EE2Req.der >certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA0-306171851.crl >-1 >-1 >-1 >n >n >=== >Generating key. This may take a few moments... >Enter the type of the distribution point name: > 1 - Full Name > 2 - Relative Name > Any other number to finish > Choice: > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Select one of the following for the reason flags > 0 - unused > 1 - keyCompromise > 2 - caCompromise > 3 - affiliationChanged > 4 - superseded > 5 - cessationOfOperation > 6 - certificateHold > Any other number to finish Choice: > Enter value for the CRL Issuer name: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? >Is this a critical extension [y/N]? >chains.sh: #4083: CRLDP: Creating EE certifiate request EE2Req.der - PASSED >chains.sh: Creating certficate EE2CA0.der signed by CA0 >certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >1 >7 >http://localhost.localdomain:9228/localhost-17100-CA0Root-306171842.der >0 >n >n >=== >Enter access method type for Authority Information Access extension: > 1 - CA Issuers > 2 - OCSP > Anyother number to finish > Choice > >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > >Enter data: >Select one of the following general name type: > 2 - rfc822Name > 3 - dnsName > 5 - directoryName > 7 - uniformResourceidentifier > 8 - ipAddress > 9 - registerID > Any other number to finish > Choice: > Add another location to the Authority Information Access extension [y/N] >Is this a critical extension [y/N]? >chains.sh: #4084: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED >chains.sh: Importing certificate EE2CA0.der to EE2DB database >certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der >chains.sh: #4085: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED >chains.sh: Create CRL for RootDB >crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl >=== Crlutil input data === >update=20130307001917Z >nextupdate=20140307001917Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > This Update: Thu Mar 07 00:19:17 2013 > Next Update: Fri Mar 07 00:19:17 2014 > CRL Extensions: >chains.sh: #4086: CRLDP: Create CRL for RootDB - PASSED >chains.sh: Create CRL for CA0DB >crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl >=== Crlutil input data === >update=20130307001917Z >nextupdate=20140307001917Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA0 Intermediate,O=CA0,C=US" > This Update: Thu Mar 07 00:19:17 2013 > Next Update: Fri Mar 07 00:19:17 2014 > CRL Extensions: >chains.sh: #4087: CRLDP: Create CRL for CA0DB - PASSED >chains.sh: Create CRL for CA1DB >crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl >=== Crlutil input data === >update=20130307001918Z >nextupdate=20140307001918Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > This Update: Thu Mar 07 00:19:18 2013 > Next Update: Fri Mar 07 00:19:18 2014 > CRL Extensions: >chains.sh: #4088: CRLDP: Create CRL for CA1DB - PASSED >chains.sh: Create CRL for CA2DB >crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl >=== Crlutil input data === >update=20130307001918Z >nextupdate=20140307001918Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA2 Intermediate,O=CA2,C=US" > This Update: Thu Mar 07 00:19:18 2013 > Next Update: Fri Mar 07 00:19:18 2014 > CRL Extensions: >chains.sh: #4089: CRLDP: Create CRL for CA2DB - PASSED >chains.sh: Revoking certificate with SN 20 issued by CA0 >crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl >=== Crlutil input data === >update=20130307001919Z >addcert 20 20130307001919Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA0 Intermediate,O=CA0,C=US" > This Update: Thu Mar 07 00:19:19 2013 > Next Update: Fri Mar 07 00:19:17 2014 > Entry 1 (0x1): > Serial Number: 20 (0x14) > Revocation Date: Thu Mar 07 00:19:19 2013 > CRL Extensions: >chains.sh: #4090: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED >chains.sh: Revoking certificate with SN 40 issued by CA0 >crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl >=== Crlutil input data === >update=20130307001920Z >addcert 40 20130307001920Z >=== >CRL Info: >: > Version: 2 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA0 Intermediate,O=CA0,C=US" > This Update: Thu Mar 07 00:19:20 2013 > Next Update: Fri Mar 07 00:19:17 2014 > Entry 1 (0x1): > Serial Number: 20 (0x14) > Revocation Date: Thu Mar 07 00:19:19 2013 > Entry 2 (0x2): > Serial Number: 40 (0x28) > Revocation Date: Thu Mar 07 00:19:20 2013 > CRL Extensions: >chains.sh: #4091: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED >chains.sh: Creating DB AllDB >certutil -N -d AllDB -f AllDB/dbpasswd >chains.sh: #4092: CRLDP: Creating DB AllDB - PASSED >chains.sh: Importing certificate Root.der to AllDB database >certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der >chains.sh: #4093: CRLDP: Importing certificate Root.der to AllDB database - PASSED >chains.sh: Importing CRL Root.crl to AllDB database >crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl >chains.sh: #4094: CRLDP: Importing CRL Root.crl to AllDB database - PASSED >chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -g chain -h requireFreshInfo -m crl -d AllDB -f -t Root.der >vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171962 (0x123fd03a) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:19:15 2013 > Not After : Wed Mar 07 00:19:15 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d4:3f:a9:a4:72:9d:78:42:de:3e:01:db:fc:c6:a6:37: > 9b:70:50:d1:76:81:74:e3:2a:9e:71:a9:68:de:79:a3: > f4:0f:6a:3f:26:be:f9:fd:a9:bb:3e:06:69:4b:8d:99: > aa:2f:02:c6:35:b1:fe:1b:fb:ac:0a:bd:be:6d:e1:4f: > 0f:04:14:50:10:95:e8:fc:78:e9:f2:ee:4c:ec:95:eb: > 6c:be:c8:16:3a:a8:76:d9:08:d0:2a:f3:ff:47:22:dd: > 62:5a:62:9b:b8:f8:d1:88:ac:df:94:66:17:ea:dd:1a: > 51:23:44:2b:58:41:9d:f1:3b:25:6c:1e:8e:a7:c9:39 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > cf:76:8c:4d:01:53:5d:48:94:84:6b:90:12:26:d0:80: > 76:24:2b:e8:5e:93:3b:40:b2:25:0e:bd:6a:e7:f6:f9: > 86:29:0f:89:50:1c:ee:79:62:d4:88:2b:52:88:02:e4: > 34:04:d2:61:52:87:20:1d:0a:4e:02:08:66:01:8b:58: > b7:e1:25:18:00:94:97:49:17:41:4d:fd:01:29:ed:c9: > 6e:6e:11:d1:d6:9c:a4:f5:5d:58:21:de:f1:5f:d6:40: > a8:2a:1f:26:b2:c3:49:33:e7:d9:fc:6b:11:0c:ae:d7: > db:37:8d:f5:e8:f9:4e:8d:fa:4f:01:d9:d9:b0:7d:6b > Fingerprint (MD5): > 3C:1A:AF:AC:39:65:1C:09:32:8B:F5:D7:91:95:23:67 > Fingerprint (SHA1): > 57:68:5D:7A:93:85:AC:CB:4C:A6:20:7A:05:4F:E0:46:B9:9E:06:A1 > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" >Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" >Returned value is 0, expected result is pass >chains.sh: #4095: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -g chain -h requireFreshInfo -m crl -d AllDB -f -t Root.der - PASSED >chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -g chain -h requireFreshInfo -m crl -d AllDB -f -t Root.der >vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 3. Root [Certificate Authority]: > ERROR -8180: Peer's Certificate has been revoked. > ERROR -8180: Peer's Certificate has been revoked. >Returned value is 1, expected result is fail >chains.sh: #4096: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -g chain -h requireFreshInfo -m crl -d AllDB -f -t Root.der - PASSED >chains.sh: Verifying certificate(s) EE1CA0.der with flags -g leaf -h requireFreshInfo -m crl -d AllDB -f -t Root.der >vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171962 (0x123fd03a) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=Root ROOT CA,O=Root,C=US" > Validity: > Not Before: Thu Mar 07 00:19:15 2013 > Not After : Wed Mar 07 00:19:15 2063 > Subject: "CN=Root ROOT CA,O=Root,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d4:3f:a9:a4:72:9d:78:42:de:3e:01:db:fc:c6:a6:37: > 9b:70:50:d1:76:81:74:e3:2a:9e:71:a9:68:de:79:a3: > f4:0f:6a:3f:26:be:f9:fd:a9:bb:3e:06:69:4b:8d:99: > aa:2f:02:c6:35:b1:fe:1b:fb:ac:0a:bd:be:6d:e1:4f: > 0f:04:14:50:10:95:e8:fc:78:e9:f2:ee:4c:ec:95:eb: > 6c:be:c8:16:3a:a8:76:d9:08:d0:2a:f3:ff:47:22:dd: > 62:5a:62:9b:b8:f8:d1:88:ac:df:94:66:17:ea:dd:1a: > 51:23:44:2b:58:41:9d:f1:3b:25:6c:1e:8e:a7:c9:39 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > cf:76:8c:4d:01:53:5d:48:94:84:6b:90:12:26:d0:80: > 76:24:2b:e8:5e:93:3b:40:b2:25:0e:bd:6a:e7:f6:f9: > 86:29:0f:89:50:1c:ee:79:62:d4:88:2b:52:88:02:e4: > 34:04:d2:61:52:87:20:1d:0a:4e:02:08:66:01:8b:58: > b7:e1:25:18:00:94:97:49:17:41:4d:fd:01:29:ed:c9: > 6e:6e:11:d1:d6:9c:a4:f5:5d:58:21:de:f1:5f:d6:40: > a8:2a:1f:26:b2:c3:49:33:e7:d9:fc:6b:11:0c:ae:d7: > db:37:8d:f5:e8:f9:4e:8d:fa:4f:01:d9:d9:b0:7d:6b > Fingerprint (MD5): > 3C:1A:AF:AC:39:65:1C:09:32:8B:F5:D7:91:95:23:67 > Fingerprint (SHA1): > 57:68:5D:7A:93:85:AC:CB:4C:A6:20:7A:05:4F:E0:46:B9:9E:06:A1 > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" >Returned value is 0, expected result is pass >chains.sh: #4097: CRLDP: Verifying certificate(s) EE1CA0.der with flags -g leaf -h requireFreshInfo -m crl -d AllDB -f -t Root.der - PASSED >chains.sh: Verifying certificate(s) EE2CA0.der with flags -g leaf -h requireFreshInfo -m crl -d AllDB -f -t Root.der >vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. Root [Certificate Authority]: > ERROR -8180: Peer's Certificate has been revoked. > ERROR -8180: Peer's Certificate has been revoked. >Returned value is 1, expected result is fail >chains.sh: #4098: CRLDP: Verifying certificate(s) EE2CA0.der with flags -g leaf -h requireFreshInfo -m crl -d AllDB -f -t Root.der - PASSED >chains.sh: Creating DB RootCADB >certutil -N -d RootCADB -f RootCADB/dbpasswd >chains.sh: #4099: TrustAnchors: Creating DB RootCADB - PASSED >chains.sh: Creating Root CA RootCA >certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171966 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #4100: TrustAnchors: Creating Root CA RootCA - PASSED >chains.sh: Exporting Root CA RootCA.der >certutil -L -d RootCADB -r -n RootCA -o RootCA.der >chains.sh: #4101: TrustAnchors: Exporting Root CA RootCA.der - PASSED >chains.sh: Creating DB CA1DB >certutil -N -d CA1DB -f CA1DB/dbpasswd >chains.sh: #4102: TrustAnchors: Creating DB CA1DB - PASSED >chains.sh: Creating Intermediate certifiate request CA1Req.der >certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #4103: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED >chains.sh: Creating certficate CA1RootCA.der signed by RootCA >certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 306171967 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #4104: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED >chains.sh: Importing certificate CA1RootCA.der to CA1DB database >certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der >chains.sh: #4105: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED >chains.sh: Creating DB CA2DB >certutil -N -d CA2DB -f CA2DB/dbpasswd >chains.sh: #4106: TrustAnchors: Creating DB CA2DB - PASSED >chains.sh: Creating Intermediate certifiate request CA2Req.der >certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #4107: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED >chains.sh: Creating certficate CA2CA1.der signed by CA1 >certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 306171968 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #4108: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED >chains.sh: Importing certificate CA2CA1.der to CA2DB database >certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der >chains.sh: #4109: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED >chains.sh: Creating DB EE1DB >certutil -N -d EE1DB -f EE1DB/dbpasswd >chains.sh: #4110: TrustAnchors: Creating DB EE1DB - PASSED >chains.sh: Creating EE certifiate request EE1Req.der >certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #4111: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED >chains.sh: Creating certficate EE1CA2.der signed by CA2 >certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 306171969 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #4112: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED >chains.sh: Importing certificate EE1CA2.der to EE1DB database >certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der >chains.sh: #4113: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED >chains.sh: Creating DB OtherRootDB >certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd >chains.sh: #4114: TrustAnchors: Creating DB OtherRootDB - PASSED >chains.sh: Creating Root CA OtherRoot >certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 306171970 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >5 >6 >9 >n >y >-1 >n >5 >6 >7 >9 >n >=== >Generating key. This may take a few moments... > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > 0 - Digital Signature > 1 - Non-repudiation > 2 - Key encipherment > 3 - Data encipherment > 4 - Key agreement > 5 - Cert signing key > 6 - CRL signing key > Other to finish > > Is this a critical extension [y/N]? >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > 0 - SSL Client > 1 - SSL Server > 2 - S/MIME > 3 - Object Signing > 4 - Reserved for future use > 5 - SSL CA > 6 - S/MIME CA > 7 - Object Signing CA > Other to finish > > Is this a critical extension [y/N]? >chains.sh: #4115: TrustAnchors: Creating Root CA OtherRoot - PASSED >chains.sh: Exporting Root CA OtherRoot.der >certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der >chains.sh: #4116: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED >chains.sh: Creating DB OtherIntermediateDB >certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd >chains.sh: #4117: TrustAnchors: Creating DB OtherIntermediateDB - PASSED >chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der >certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >y >-1 >y >=== >Generating key. This may take a few moments... >Is this a CA certificate [y/N]? >Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? >chains.sh: #4118: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED >chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot >certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 306171971 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #4119: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED >chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database >certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der >chains.sh: #4120: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED >chains.sh: Creating DB EE2DB >certutil -N -d EE2DB -f EE2DB/dbpasswd >chains.sh: #4121: TrustAnchors: Creating DB EE2DB - PASSED >chains.sh: Creating EE certifiate request EE2Req.der >certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >Generating key. This may take a few moments... >chains.sh: #4122: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED >chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate >certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 306171972 < /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/pkix/cu_data >=== Certutil input data === >=== >chains.sh: #4123: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED >chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database >certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der >chains.sh: #4124: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED >chains.sh: Creating DB DBOnlyDB >certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd >chains.sh: #4125: TrustAnchors: Creating DB DBOnlyDB - PASSED >chains.sh: Importing certificate RootCA.der to DBOnlyDB database >certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der >chains.sh: #4126: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED >chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database >certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der >chains.sh: #4127: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED >chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB >vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171966 (0x123fd03e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:19:20 2013 > Not After : Wed Mar 07 00:19:20 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d2:f8:bd:23:8d:20:81:17:ec:9e:7c:53:5a:ae:ef:a0: > 78:80:c2:b0:4b:c3:e8:f3:91:58:2e:c1:51:dc:cd:1c: > 03:aa:ea:54:da:d2:a7:ab:d5:4a:67:90:2a:1a:27:8e: > 9c:93:32:d9:50:fa:de:3c:72:34:95:a3:67:42:12:48: > 4e:d2:ee:48:c0:68:b0:61:18:f2:06:51:6c:e8:84:05: > ef:ad:e7:97:53:91:56:26:b5:de:1c:d7:fe:62:54:55: > c6:89:8e:b2:fc:87:90:ef:3c:c8:1d:cb:b9:9c:8e:de: > 12:ef:2c:ce:06:ea:f9:80:99:08:7a:dd:7d:2e:ae:45 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 71:28:9c:62:fc:53:bb:ec:7c:4b:7e:92:8e:ec:db:99: > b3:65:f1:4b:c3:90:ee:cb:82:92:33:68:22:86:61:58: > 17:3b:ee:e2:90:a5:cd:d5:a6:83:4e:ae:f0:28:4a:c0: > 61:f4:bc:d8:6c:58:1a:f8:06:ad:ea:29:73:42:28:0d: > 2f:d2:0b:63:3b:9d:78:f1:88:44:a6:cf:52:8f:81:84: > a4:d0:6a:9c:98:35:07:bb:65:a2:5d:5a:94:94:2b:8c: > 56:30:67:e6:f1:fb:77:23:8e:61:6c:b4:d1:3a:b9:7c: > 6d:13:09:cf:5e:47:2b:1b:ab:0b:39:34:2d:2c:84:10 > Fingerprint (MD5): > 63:AF:AD:AE:09:73:01:65:96:43:57:CB:EF:92:39:F6 > Fingerprint (SHA1): > 6F:06:8C:D1:3F:4F:B1:B8:29:72:D7:30:99:87:C3:42:67:6C:31:FD > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #4128: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB - PASSED >chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -t CA2CA1.der >vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171968 (0x123fd040) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:19:21 2013 > Not After : Wed Mar 07 00:19:21 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b7:6b:eb:b8:0c:de:67:c2:58:eb:a6:d0:22:6c:69:bf: > 4d:d6:3a:e7:18:a5:2e:0f:2d:3e:64:b0:8e:d8:93:5d: > 86:5c:3c:39:e9:e5:55:64:60:eb:e4:26:86:0c:18:a5: > ab:2a:26:51:db:0f:8a:56:1d:be:90:c1:49:c9:73:61: > d3:22:cd:e0:4c:b8:bb:5d:37:16:4f:cf:0d:01:7c:eb: > fa:1f:93:c1:82:c5:99:57:46:a7:22:33:73:6a:09:16: > 84:46:c2:83:0b:63:ed:fa:6a:62:f6:2f:c5:be:16:2a: > 41:e6:22:9e:8d:aa:97:ac:10:2c:9c:08:c6:af:f2:13 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 78:82:76:17:31:54:03:86:ff:58:7a:ec:bf:e1:0f:ab: > be:46:0d:8c:18:27:10:95:64:e1:bf:25:f8:46:2b:db: > 0c:aa:49:59:fc:35:70:c3:37:2c:18:71:4b:af:84:02: > d0:4b:f1:a4:7f:48:28:bf:78:9e:2a:6d:31:d9:a3:cb: > e6:7b:84:ac:e5:5b:0f:fa:c1:47:92:32:fd:27:c2:e0: > d5:75:89:2e:5b:d8:73:b1:35:92:78:88:6c:2f:2d:bb: > 5a:19:2b:58:1c:97:69:8c:99:c1:c2:a0:29:87:95:e1: > b5:47:83:d6:4a:dc:21:12:f9:54:f0:4a:68:60:00:7b > Fingerprint (MD5): > 02:2E:B0:A6:B3:9F:9E:CA:9F:9C:25:FF:0F:D0:E7:ED > Fingerprint (SHA1): > 0F:E5:DA:59:7B:F2:2A:B5:33:21:5F:22:BC:BA:0E:69:8D:AE:3C:14 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Returned value is 0, expected result is pass >chains.sh: #4129: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -t CA2CA1.der - PASSED >chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -t RootCA >vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171966 (0x123fd03e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:19:20 2013 > Not After : Wed Mar 07 00:19:20 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d2:f8:bd:23:8d:20:81:17:ec:9e:7c:53:5a:ae:ef:a0: > 78:80:c2:b0:4b:c3:e8:f3:91:58:2e:c1:51:dc:cd:1c: > 03:aa:ea:54:da:d2:a7:ab:d5:4a:67:90:2a:1a:27:8e: > 9c:93:32:d9:50:fa:de:3c:72:34:95:a3:67:42:12:48: > 4e:d2:ee:48:c0:68:b0:61:18:f2:06:51:6c:e8:84:05: > ef:ad:e7:97:53:91:56:26:b5:de:1c:d7:fe:62:54:55: > c6:89:8e:b2:fc:87:90:ef:3c:c8:1d:cb:b9:9c:8e:de: > 12:ef:2c:ce:06:ea:f9:80:99:08:7a:dd:7d:2e:ae:45 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 71:28:9c:62:fc:53:bb:ec:7c:4b:7e:92:8e:ec:db:99: > b3:65:f1:4b:c3:90:ee:cb:82:92:33:68:22:86:61:58: > 17:3b:ee:e2:90:a5:cd:d5:a6:83:4e:ae:f0:28:4a:c0: > 61:f4:bc:d8:6c:58:1a:f8:06:ad:ea:29:73:42:28:0d: > 2f:d2:0b:63:3b:9d:78:f1:88:44:a6:cf:52:8f:81:84: > a4:d0:6a:9c:98:35:07:bb:65:a2:5d:5a:94:94:2b:8c: > 56:30:67:e6:f1:fb:77:23:8e:61:6c:b4:d1:3a:b9:7c: > 6d:13:09:cf:5e:47:2b:1b:ab:0b:39:34:2d:2c:84:10 > Fingerprint (MD5): > 63:AF:AD:AE:09:73:01:65:96:43:57:CB:EF:92:39:F6 > Fingerprint (SHA1): > 6F:06:8C:D1:3F:4F:B1:B8:29:72:D7:30:99:87:C3:42:67:6C:31:FD > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #4130: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -t RootCA - PASSED >chains.sh: Creating DB TrustOnlyDB >certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd >chains.sh: #4131: TrustAnchors: Creating DB TrustOnlyDB - PASSED >chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -t RootCA.der >vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171966 (0x123fd03e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:19:20 2013 > Not After : Wed Mar 07 00:19:20 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d2:f8:bd:23:8d:20:81:17:ec:9e:7c:53:5a:ae:ef:a0: > 78:80:c2:b0:4b:c3:e8:f3:91:58:2e:c1:51:dc:cd:1c: > 03:aa:ea:54:da:d2:a7:ab:d5:4a:67:90:2a:1a:27:8e: > 9c:93:32:d9:50:fa:de:3c:72:34:95:a3:67:42:12:48: > 4e:d2:ee:48:c0:68:b0:61:18:f2:06:51:6c:e8:84:05: > ef:ad:e7:97:53:91:56:26:b5:de:1c:d7:fe:62:54:55: > c6:89:8e:b2:fc:87:90:ef:3c:c8:1d:cb:b9:9c:8e:de: > 12:ef:2c:ce:06:ea:f9:80:99:08:7a:dd:7d:2e:ae:45 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 71:28:9c:62:fc:53:bb:ec:7c:4b:7e:92:8e:ec:db:99: > b3:65:f1:4b:c3:90:ee:cb:82:92:33:68:22:86:61:58: > 17:3b:ee:e2:90:a5:cd:d5:a6:83:4e:ae:f0:28:4a:c0: > 61:f4:bc:d8:6c:58:1a:f8:06:ad:ea:29:73:42:28:0d: > 2f:d2:0b:63:3b:9d:78:f1:88:44:a6:cf:52:8f:81:84: > a4:d0:6a:9c:98:35:07:bb:65:a2:5d:5a:94:94:2b:8c: > 56:30:67:e6:f1:fb:77:23:8e:61:6c:b4:d1:3a:b9:7c: > 6d:13:09:cf:5e:47:2b:1b:ab:0b:39:34:2d:2c:84:10 > Fingerprint (MD5): > 63:AF:AD:AE:09:73:01:65:96:43:57:CB:EF:92:39:F6 > Fingerprint (SHA1): > 6F:06:8C:D1:3F:4F:B1:B8:29:72:D7:30:99:87:C3:42:67:6C:31:FD >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #4132: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -t RootCA.der - PASSED >chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -t CA2CA1.der >vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171968 (0x123fd040) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=CA1 Intermediate,O=CA1,C=US" > Validity: > Not Before: Thu Mar 07 00:19:21 2013 > Not After : Wed Mar 07 00:19:21 2018 > Subject: "CN=CA2 Intermediate,O=CA2,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b7:6b:eb:b8:0c:de:67:c2:58:eb:a6:d0:22:6c:69:bf: > 4d:d6:3a:e7:18:a5:2e:0f:2d:3e:64:b0:8e:d8:93:5d: > 86:5c:3c:39:e9:e5:55:64:60:eb:e4:26:86:0c:18:a5: > ab:2a:26:51:db:0f:8a:56:1d:be:90:c1:49:c9:73:61: > d3:22:cd:e0:4c:b8:bb:5d:37:16:4f:cf:0d:01:7c:eb: > fa:1f:93:c1:82:c5:99:57:46:a7:22:33:73:6a:09:16: > 84:46:c2:83:0b:63:ed:fa:6a:62:f6:2f:c5:be:16:2a: > 41:e6:22:9e:8d:aa:97:ac:10:2c:9c:08:c6:af:f2:13 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Basic Constraints > Critical: True > Data: Is a CA with no maximum path length. > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 78:82:76:17:31:54:03:86:ff:58:7a:ec:bf:e1:0f:ab: > be:46:0d:8c:18:27:10:95:64:e1:bf:25:f8:46:2b:db: > 0c:aa:49:59:fc:35:70:c3:37:2c:18:71:4b:af:84:02: > d0:4b:f1:a4:7f:48:28:bf:78:9e:2a:6d:31:d9:a3:cb: > e6:7b:84:ac:e5:5b:0f:fa:c1:47:92:32:fd:27:c2:e0: > d5:75:89:2e:5b:d8:73:b1:35:92:78:88:6c:2f:2d:bb: > 5a:19:2b:58:1c:97:69:8c:99:c1:c2:a0:29:87:95:e1: > b5:47:83:d6:4a:dc:21:12:f9:54:f0:4a:68:60:00:7b > Fingerprint (MD5): > 02:2E:B0:A6:B3:9F:9E:CA:9F:9C:25:FF:0F:D0:E7:ED > Fingerprint (SHA1): > 0F:E5:DA:59:7B:F2:2A:B5:33:21:5F:22:BC:BA:0E:69:8D:AE:3C:14 >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Returned value is 0, expected result is pass >chains.sh: #4133: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -t CA2CA1.der - PASSED >chains.sh: Creating DB TrustAndDBDB >certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd >chains.sh: #4134: TrustAnchors: Creating DB TrustAndDBDB - PASSED >chains.sh: Importing certificate RootCA.der to TrustAndDBDB database >certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der >chains.sh: #4135: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED >chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database >certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der >chains.sh: #4136: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED >chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB >vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171966 (0x123fd03e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:19:20 2013 > Not After : Wed Mar 07 00:19:20 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d2:f8:bd:23:8d:20:81:17:ec:9e:7c:53:5a:ae:ef:a0: > 78:80:c2:b0:4b:c3:e8:f3:91:58:2e:c1:51:dc:cd:1c: > 03:aa:ea:54:da:d2:a7:ab:d5:4a:67:90:2a:1a:27:8e: > 9c:93:32:d9:50:fa:de:3c:72:34:95:a3:67:42:12:48: > 4e:d2:ee:48:c0:68:b0:61:18:f2:06:51:6c:e8:84:05: > ef:ad:e7:97:53:91:56:26:b5:de:1c:d7:fe:62:54:55: > c6:89:8e:b2:fc:87:90:ef:3c:c8:1d:cb:b9:9c:8e:de: > 12:ef:2c:ce:06:ea:f9:80:99:08:7a:dd:7d:2e:ae:45 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 71:28:9c:62:fc:53:bb:ec:7c:4b:7e:92:8e:ec:db:99: > b3:65:f1:4b:c3:90:ee:cb:82:92:33:68:22:86:61:58: > 17:3b:ee:e2:90:a5:cd:d5:a6:83:4e:ae:f0:28:4a:c0: > 61:f4:bc:d8:6c:58:1a:f8:06:ad:ea:29:73:42:28:0d: > 2f:d2:0b:63:3b:9d:78:f1:88:44:a6:cf:52:8f:81:84: > a4:d0:6a:9c:98:35:07:bb:65:a2:5d:5a:94:94:2b:8c: > 56:30:67:e6:f1:fb:77:23:8e:61:6c:b4:d1:3a:b9:7c: > 6d:13:09:cf:5e:47:2b:1b:ab:0b:39:34:2d:2c:84:10 > Fingerprint (MD5): > 63:AF:AD:AE:09:73:01:65:96:43:57:CB:EF:92:39:F6 > Fingerprint (SHA1): > 6F:06:8C:D1:3F:4F:B1:B8:29:72:D7:30:99:87:C3:42:67:6C:31:FD > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #4137: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB - PASSED >chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -t OtherRoot.der >vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171970 (0x123fd042) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" > Validity: > Not Before: Thu Mar 07 00:19:21 2013 > Not After : Wed Mar 07 00:19:21 2063 > Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b6:4f:93:1b:fb:d8:f4:94:f6:6c:e0:f6:94:63:6e:a2: > 92:c1:31:6a:ec:67:fc:c3:4a:6c:c3:ce:42:3d:37:5e: > 48:b7:04:57:89:6b:ee:aa:e1:eb:1e:99:6f:83:13:f9: > fe:f0:45:ea:10:41:0e:5d:7e:84:8d:bc:a1:60:bd:e3: > 84:f7:23:fa:6a:9d:22:01:0d:04:e0:a7:6f:fe:7d:57: > 3a:83:cc:d9:37:8d:33:36:c7:0e:9b:43:dc:38:de:ad: > c2:9a:67:92:60:5d:70:15:9a:d3:98:97:1e:f9:8a:5f: > d0:64:12:95:1a:93:16:92:3b:63:43:7b:6c:29:42:9d > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > a5:a6:48:9c:91:74:d7:b8:81:54:b0:68:df:f2:b6:b3: > 27:e1:dd:45:74:9b:6b:ba:ce:60:f2:a2:76:79:18:b5: > 89:b5:c4:7a:43:c6:78:a0:dd:7b:ec:bc:24:bd:9b:38: > 3f:6b:b5:a4:b1:3c:68:20:26:64:82:49:b2:2e:d2:9f: > 50:5f:6a:f0:37:12:23:5c:25:0e:a0:0b:7d:aa:bd:a3: > bc:41:c0:ce:23:54:a8:79:2a:75:05:61:be:6b:20:2e: > 5d:0a:15:69:b9:2e:11:f9:01:39:e9:12:fb:c7:12:ea: > d9:e5:bd:07:16:ea:fb:a8:ad:07:2c:43:10:b7:54:f0 > Fingerprint (MD5): > 18:F5:25:92:12:E5:A2:A1:E7:93:0A:E2:DE:0E:4F:4C > Fingerprint (SHA1): > A4:F8:79:FF:F0:C1:96:30:4D:49:7E:09:FF:53:B7:BF:06:E5:C6:8B >Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" >Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate > ,C=US" >Returned value is 0, expected result is pass >chains.sh: #4138: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -t OtherRoot.der - PASSED >chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -T -d TrustAndDBDB -t OtherIntermediateOtherRoot.der -t OtherRoot.der >vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der >Chain is good! >Root Certificate: > Data: > Version: 3 (0x2) > Serial Number: 306171966 (0x123fd03e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" > Validity: > Not Before: Thu Mar 07 00:19:20 2013 > Not After : Wed Mar 07 00:19:20 2063 > Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d2:f8:bd:23:8d:20:81:17:ec:9e:7c:53:5a:ae:ef:a0: > 78:80:c2:b0:4b:c3:e8:f3:91:58:2e:c1:51:dc:cd:1c: > 03:aa:ea:54:da:d2:a7:ab:d5:4a:67:90:2a:1a:27:8e: > 9c:93:32:d9:50:fa:de:3c:72:34:95:a3:67:42:12:48: > 4e:d2:ee:48:c0:68:b0:61:18:f2:06:51:6c:e8:84:05: > ef:ad:e7:97:53:91:56:26:b5:de:1c:d7:fe:62:54:55: > c6:89:8e:b2:fc:87:90:ef:3c:c8:1d:cb:b9:9c:8e:de: > 12:ef:2c:ce:06:ea:f9:80:99:08:7a:dd:7d:2e:ae:45 > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 71:28:9c:62:fc:53:bb:ec:7c:4b:7e:92:8e:ec:db:99: > b3:65:f1:4b:c3:90:ee:cb:82:92:33:68:22:86:61:58: > 17:3b:ee:e2:90:a5:cd:d5:a6:83:4e:ae:f0:28:4a:c0: > 61:f4:bc:d8:6c:58:1a:f8:06:ad:ea:29:73:42:28:0d: > 2f:d2:0b:63:3b:9d:78:f1:88:44:a6:cf:52:8f:81:84: > a4:d0:6a:9c:98:35:07:bb:65:a2:5d:5a:94:94:2b:8c: > 56:30:67:e6:f1:fb:77:23:8e:61:6c:b4:d1:3a:b9:7c: > 6d:13:09:cf:5e:47:2b:1b:ab:0b:39:34:2d:2c:84:10 > Fingerprint (MD5): > 63:AF:AD:AE:09:73:01:65:96:43:57:CB:EF:92:39:F6 > Fingerprint (SHA1): > 6F:06:8C:D1:3F:4F:B1:B8:29:72:D7:30:99:87:C3:42:67:6C:31:FD > Certificate Trust Flags: > SSL Flags: > Valid CA > Trusted CA > Trusted Client CA > Email Flags: > Valid CA > Trusted CA > Object Signing Flags: > Valid CA > Trusted CA >Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" >Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" >Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" >Returned value is 0, expected result is pass >chains.sh: #4139: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -T -d TrustAndDBDB -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED >chains.sh: Creating DB ExplicitDistrustDB >certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd >chains.sh: #4140: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED >chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database >certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der >chains.sh: #4141: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED >chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database >certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der >chains.sh: #4142: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED >chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database >certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der >chains.sh: #4143: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED >chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -t CA1RootCA.der >vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der >Chain is bad! >PROBLEM WITH THE CERT CHAIN: >CERT 2. CA1 [Certificate Authority]: > ERROR -8171: Peer's certificate has been marked as not trusted by the user. >Returned value is 1, expected result is fail >chains.sh: #4144: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -t CA1RootCA.der - PASSED >trying to kill httpserv with PID 2617 at Wed Mar 6 17:19:23 MST 2013 >kill -USR1 2617 >selfserv: normal termination >httpserv -b -p 9228 2>/dev/null; >httpserv with PID 2617 killed at Wed Mar 6 17:19:23 MST 2013 >TIMESTAMP chains END: Wed Mar 6 17:19:23 MST 2013 >chains.sh: Testing with upgraded library =============================== >cp: cannot stat '/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/eccurves': No such file or directory >cp: cannot stat '/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/cert.done': No such file or directory >Running tests for dbupgrade >TIMESTAMP dbupgrade BEGIN: Wed Mar 6 17:19:23 MST 2013 >dbupgrade.sh: DB upgrade tests =============================== >Reset databases to their initial values: >certutil: could not find certificate named "objsigner": security library: bad database. >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >FIPS_PUB_140_Test_Certificate Cu,Cu,Cu >dbupgrade.sh: Legacy to shared Library update =============================== >alicedir >upgrading db alicedir >Generating key. This may take a few moments... >dbupgrade.sh: #4145: Upgrading alicedir - PASSED >bobdir >upgrading db bobdir >Generating key. This may take a few moments... >dbupgrade.sh: #4146: Upgrading bobdir - PASSED >CA >upgrading db CA >Generating key. This may take a few moments... >dbupgrade.sh: #4147: Upgrading CA - PASSED >cert_extensions >upgrading db cert_extensions >Generating key. This may take a few moments... >dbupgrade.sh: #4148: Upgrading cert_extensions - PASSED >client >upgrading db client >Generating key. This may take a few moments... >dbupgrade.sh: #4149: Upgrading client - PASSED >clientCA >upgrading db clientCA >Generating key. This may take a few moments... >dbupgrade.sh: #4150: Upgrading clientCA - PASSED >dave >upgrading db dave >Generating key. This may take a few moments... >dbupgrade.sh: #4151: Upgrading dave - PASSED >eccurves >skipping db eccurves >dbupgrade.sh: #4152: No directory eccurves - PASSED >eve >upgrading db eve >Generating key. This may take a few moments... >dbupgrade.sh: #4153: Upgrading eve - PASSED >ext_client >upgrading db ext_client >Generating key. This may take a few moments... >dbupgrade.sh: #4154: Upgrading ext_client - PASSED >ext_server >upgrading db ext_server >Generating key. This may take a few moments... >dbupgrade.sh: #4155: Upgrading ext_server - PASSED >SDR >upgrading db SDR >Generating key. This may take a few moments... >dbupgrade.sh: #4156: Upgrading SDR - PASSED >server >upgrading db server >Generating key. This may take a few moments... >dbupgrade.sh: #4157: Upgrading server - PASSED >serverCA >upgrading db serverCA >Generating key. This may take a few moments... >dbupgrade.sh: #4158: Upgrading serverCA - PASSED >tools/copydir >skipping db tools/copydir >dbupgrade.sh: #4159: No directory tools/copydir - PASSED >upgrading db fips >Generating key. This may take a few moments... >dbupgrade.sh: #4160: Upgrading fips - PASSED >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >FIPS_PUB_140_Test_Certificate Cu,Cu,Cu >TIMESTAMP dbupgrade END: Wed Mar 6 17:20:17 MST 2013 >Running tests for lowhash >TIMESTAMP lowhash BEGIN: Wed Mar 6 17:20:17 MST 2013 >lowhash.sh: Lowhash Tests - /proc/sys/crypto/fips_enabled is 0 =============================== >freebl lowhash not supported in this plaform. >lowhash.sh done >TIMESTAMP lowhash END: Wed Mar 6 17:20:17 MST 2013 >Running tests for tools >TIMESTAMP tools BEGIN: Wed Mar 6 17:20:17 MST 2013 >tools.sh: Tools Tests =============================== >tools.sh: Exporting Alice's email cert & key - default ciphers >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4161: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 52:b7:e9:31:f4:ef:50:61:0d:20:7a:0d:db:36:84:41 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4162: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4163: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4164: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC > Parameters: > Salt: > 71:0c:d7:9d:37:37:e0:90:04:45:56:2d:5d:d5:e6:91 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4165: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4166: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4167: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC > Parameters: > Salt: > 02:14:5b:31:87:08:b6:07:9c:93:1a:74:e3:23:39:46 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4168: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4169: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4170: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC > Parameters: > Salt: > 4a:8b:52:32:97:a2:d4:38:de:87:9f:cc:47:97:b1:9c > Iteration Count: 2000 (0x7d0) >tools.sh: #4171: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4172: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4173: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 42:89:c5:da:66:03:21:ae:d0:e9:3a:d4:c3:ea:ba:72 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4174: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4175: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4176: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 49:78:87:bf:48:6d:9f:51:5e:70:21:50:90:e7:de:7e > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4177: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4178: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4179: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 70:75:59:43:26:ab:a5:74:6f:49:5b:79:51:64:16:c6 > Iteration Count: 2000 (0x7d0) >tools.sh: #4180: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4181: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4182: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > ee:4c:a7:57:a4:95:5b:7b:2a:37:cd:f3:9e:80:fa:02 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-128-CBC > Args: > 04:10:65:3d:10:99:5b:09:40:3f:98:de:f9:37:4d:a1: > e5:52 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4183: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4184: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4185: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 4e:f1:9f:02:f9:35:c9:39:5a:72:7c:97:67:4d:b6:38 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-128-CBC > Args: > 04:10:6b:44:f6:9c:90:b0:b9:6d:13:bc:3d:b0:a8:a0: > 58:b1 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4186: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4187: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4188: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > a1:25:c7:22:61:02:7f:34:c9:e9:0f:50:c6:d8:78:fc > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-128-CBC > Args: > 04:10:a0:7b:42:64:b8:ab:3e:55:7d:7f:8c:a9:92:76: > 93:76 >tools.sh: #4189: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4190: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4191: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 79:97:3d:bf:3c:e2:61:8c:b2:40:fa:52:bb:ea:41:f2 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-192-CBC > Args: > 04:10:0b:ff:79:2b:5c:c6:90:2d:ae:27:ed:a0:1d:d9: > 70:42 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4192: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4193: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4194: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 06:a7:bb:be:f6:40:b5:ef:64:e1:af:4b:56:0d:58:62 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-192-CBC > Args: > 04:10:56:9e:8d:61:f1:cb:1f:31:74:1c:7d:ba:8b:a5: > 13:73 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4195: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4196: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4197: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > e1:06:9e:b0:1f:e6:f5:d4:e4:af:89:16:ff:8e:4a:d7 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-192-CBC > Args: > 04:10:22:6c:e9:18:95:f6:b4:b3:a5:d0:fe:10:e5:b8: > 0b:99 >tools.sh: #4198: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4199: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4200: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > d7:6c:89:5b:b2:83:63:3b:a2:5d:e9:b8:c2:bd:4e:42 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-256-CBC > Args: > 04:10:35:96:c9:42:46:06:35:4b:73:d3:eb:04:65:44: > 3d:3b >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4201: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4202: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4203: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > eb:be:e2:f0:0a:0e:c2:bb:ce:57:55:b7:1b:8d:dd:d0 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-256-CBC > Args: > 04:10:84:91:83:8a:bb:cd:86:74:f0:e0:da:a2:98:af: > 49:03 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4204: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4205: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4206: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 84:2c:e5:7e:66:cc:fc:15:a2:54:4b:53:c5:b9:48:bf > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: AES-256-CBC > Args: > 04:10:47:4b:b9:ca:7e:00:20:f7:d7:dd:46:e4:24:77: > 9f:1e >tools.sh: #4207: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4208: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4209: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 17:1d:85:4a:28:46:ee:ec:5c:c6:a0:14:a8:46:01:a7 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-128-CBC > Args: > 04:10:8e:95:b4:2a:60:43:bd:7d:49:a9:b4:f1:d6:ba: > 72:2a >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4210: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4211: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4212: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > ef:78:3c:9a:e9:a1:97:40:7d:bb:89:b2:3b:64:ce:46 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-128-CBC > Args: > 04:10:8c:71:b3:9e:33:e2:3f:54:cd:26:a1:b5:71:37: > 7f:37 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4213: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4214: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4215: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 7f:eb:08:30:22:e8:6f:1e:da:de:a6:0a:08:d6:67:78 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-128-CBC > Args: > 04:10:6d:6b:e5:38:da:78:e8:7e:4f:7a:27:53:2a:b2: > f9:39 >tools.sh: #4216: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4217: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4218: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 1d:6a:76:e5:bc:29:76:5b:3e:90:29:09:20:83:0b:9e > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-192-CBC > Args: > 04:10:00:55:fe:16:98:98:ff:a6:97:05:f2:bb:5d:82: > 09:46 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4219: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4220: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4221: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > d9:7d:c4:0e:1d:95:10:9d:08:08:10:93:1a:74:a6:37 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-192-CBC > Args: > 04:10:88:e3:98:7f:bf:cb:71:b5:67:41:f0:64:5e:a8: > 5b:4b >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4222: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4223: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4224: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 96:a2:29:12:bf:fc:f1:23:a8:c4:7a:c2:a7:24:dd:36 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-192-CBC > Args: > 04:10:a5:c3:5d:f0:7f:87:dc:f4:e5:60:79:e5:cc:e7: > 44:63 >tools.sh: #4225: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4226: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4227: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 6a:2e:ed:7d:b4:cc:94:50:96:a5:df:e5:a0:cc:47:e4 > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-256-CBC > Args: > 04:10:4e:32:93:5a:ae:c6:4f:00:f2:c6:62:bc:4e:80: > 27:a9 >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4228: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4229: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4230: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > df:cc:ce:e6:17:f3:42:25:f5:cc:78:3d:c6:c1:63:2e > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-256-CBC > Args: > 04:10:b7:a0:ba:00:81:4d:b8:51:c9:68:e6:ea:64:ab: > 61:fd >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4231: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4232: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4233: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption v2 > Encryption: > KDF: PKCS #5 Password Based Key Dervive Function v2 > Parameters: > Salt: > 4b:8b:8d:f0:05:6b:cb:cb:29:49:87:fc:ba:07:67:cc > Iteration Count: 2000 (0x7d0) > Key Length: 32 (0x20) > KDF algorithm: HMAC SHA-1 > Cipher: CAMELLIA-256-CBC > Args: > 04:10:f5:f2:26:65:2d:0c:90:bd:16:e2:77:17:d3:68: > cd:c9 >tools.sh: #4234: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4235: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4236: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC > Parameters: > Salt: > b6:ba:12:ea:64:bc:7b:71:be:f2:3f:49:fc:6a:0e:76 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4237: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4238: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4239: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC > Parameters: > Salt: > 4c:98:33:03:d0:91:82:68:42:bc:8c:e2:fc:19:f9:fc > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4240: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4241: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4242: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC > Parameters: > Salt: > bf:9a:63:55:cb:66:be:a2:c7:24:af:df:f4:7a:bb:72 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4243: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4244: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4245: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC > Parameters: > Salt: > 76:2c:9d:6e:ab:a1:cd:a5:72:6b:62:4d:56:f0:86:67 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4246: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4247: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4248: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC > Parameters: > Salt: > 48:f1:3b:5f:11:85:3d:2c:14:51:4f:40:a6:ce:0a:7a > Iteration Count: 2000 (0x7d0) >tools.sh: #4249: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4250: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4251: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC > Parameters: > Salt: > 6f:23:3f:50:af:66:38:22:3c:6e:36:0f:cb:df:e0:ad > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4252: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4253: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4254: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC > Parameters: > Salt: > 8d:bb:78:80:88:a8:d9:5d:c1:a7:cc:0e:69:8d:21:0c > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4255: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4256: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4257: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC > Parameters: > Salt: > 8d:31:c9:7c:34:77:82:a1:e3:62:c3:56:f9:37:0b:2b > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4258: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4259: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4260: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC > Parameters: > Salt: > af:50:a1:3f:8d:56:4c:c5:da:31:f6:58:b9:0c:94:9d > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4261: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4262: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4263: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC > Parameters: > Salt: > 18:93:01:8f:94:78:2a:f5:eb:0b:73:e0:97:d2:78:cd > Iteration Count: 2000 (0x7d0) >tools.sh: #4264: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4265: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4266: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC > Parameters: > Salt: > 8a:50:7b:a9:28:85:17:a6:12:71:e6:4a:d9:32:d1:74 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4267: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4268: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4269: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC > Parameters: > Salt: > 4b:90:5b:e7:58:47:dd:93:91:c0:dd:3a:bb:b6:fa:3f > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4270: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4271: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4272: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC > Parameters: > Salt: > 5a:99:ad:fc:26:f9:63:fd:57:aa:0b:00:fd:c9:2e:80 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4273: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4274: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4275: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC > Parameters: > Salt: > b1:92:df:21:15:1d:d2:6e:6f:30:ec:23:9d:2a:3a:25 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4276: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4277: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4278: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC > Parameters: > Salt: > 1a:46:19:25:10:cc:cc:9e:51:d2:6f:ee:7f:43:b0:f5 > Iteration Count: 2000 (0x7d0) >tools.sh: #4279: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4280: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4281: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > ea:fb:c8:fe:2b:47:f8:66:16:7a:3a:3d:d8:25:b1:5b > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4282: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4283: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4284: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 38:8a:57:7f:f8:b2:26:da:57:77:1d:7c:b8:f1:32:c8 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4285: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4286: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4287: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > c1:b1:de:2f:a7:f4:26:e6:49:ce:60:03:74:40:90:3c > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4288: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4289: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4290: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > ce:e2:69:68:d7:14:7f:eb:e7:a0:82:47:20:83:52:4f > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4291: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4292: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting with [default:null] >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4293: Exporting with [default:null] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > ef:5b:b6:fc:c5:02:a3:58:7a:54:b5:f2:38:75:ce:a2 > Iteration Count: 2000 (0x7d0) >tools.sh: #4294: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4295: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4296: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 9d:7f:07:96:88:d4:b0:e3:35:65:5a:20:2d:8e:83:12 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4297: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4298: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4299: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > c2:05:0d:f7:32:29:5e:46:cc:16:e4:92:9e:d8:83:07 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4300: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4301: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4302: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > fe:79:2d:75:65:eb:9c:7f:52:fe:6e:b9:91:29:38:98 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4303: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4304: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4305: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > dc:98:d1:5e:cf:d8:f2:6b:0f:4c:e4:42:93:36:42:1b > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4306: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4307: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4308: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 21:9f:97:13:02:c9:d7:d1:6a:97:1d:ee:04:c7:7a:1b > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4309: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4310: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4311: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 39:b0:80:d9:d4:ce:b5:15:86:2c:a0:7b:8e:12:44:69 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4312: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4313: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4314: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 9a:bf:a4:eb:3d:bf:2a:47:e2:26:fb:99:c4:0f:9b:9b > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4315: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4316: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4317: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > 84:60:5a:cf:e2:b8:f5:a0:fa:9a:f6:fd:b9:4d:e5:64 > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4318: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4319: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4320: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > bc:60:1c:c6:bb:a6:38:38:e4:f4:ae:dd:43:08:56:8b > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4321: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4322: Importing Alice.p12 (pk12util -i) - PASSED >tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4323: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED >tools.sh: Listing Alice's pk12 file >pk12util -l Alice.p12 -w ../tests.pw >Key(shrouded): > Friendly Name: Alice > Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC > Parameters: > Salt: > e2:43:58:1d:84:eb:69:99:f2:c4:3e:5e:d0:b6:22:4c > Iteration Count: 2000 (0x7d0) >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:50 2013 > Not After : Wed Mar 07 00:11:50 2063 > Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= > US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > bb:b8:31:7e:d6:a7:1e:71:c2:07:d9:f8:83:2e:84:af: > 07:f6:98:72:3d:85:e0:54:99:2e:15:8d:e3:b3:a4:5c: > ab:05:b0:da:51:80:81:fc:31:b2:83:d9:69:2d:81:bb: > d2:25:25:f2:a6:43:4b:9b:04:dd:a5:1d:b7:4b:58:1b: > 50:88:41:15:f9:bc:7a:41:cd:9e:5c:0f:2d:13:f6:91: > 47:20:1f:10:5a:f0:aa:cc:60:30:50:1a:3d:8a:29:97: > 02:1d:91:85:19:61:b2:fd:49:8f:7b:25:84:65:09:58: > 81:df:56:4a:f5:a7:01:7e:4f:ba:42:19:7e:7e:52:af > Exponent: 65537 (0x10001) > Signed Extensions: > Name: Certificate Type > Data: <SSL CA,S/MIME CA,ObjectSigning CA> > Name: Certificate Basic Constraints > Data: Is a CA with no maximum path length. > Name: Certificate Key Usage > Usages: Certificate Signing > CRL Signing > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 92:b9:2b:be:9f:26:f1:06:06:6b:fa:0e:cc:88:34:c3: > 01:26:bd:f7:5d:45:bd:a6:8d:57:98:8d:76:c7:07:0f: > f0:51:1b:48:1a:3b:e0:f3:5d:3f:06:c4:04:50:a7:19: > 4d:57:6d:86:2d:b5:f9:b9:c9:e9:b1:11:5a:fe:76:46: > a4:8a:68:a0:5c:70:db:54:21:4b:5a:d7:3e:85:19:8c: > f3:4d:84:0a:f3:8e:fd:d6:28:bb:0e:1a:a3:58:68:18: > 30:65:97:5c:66:15:aa:f1:88:2e:5b:b7:42:3c:ce:76: > 89:3b:38:e9:06:0e:7e:67:7e:5e:8f:e3:31:0e:b7:d0 > Fingerprint (MD5): > 35:E4:6A:20:41:91:1C:C9:4A:C2:BC:B1:A5:1E:99:D2 > Fingerprint (SHA1): > 93:E0:22:87:7A:74:6C:7A:F1:81:1A:01:16:22:D7:21:BB:C3:11:5E > Friendly Name: TestCA >Certificate(has private key): > Data: > Version: 3 (0x2) > Serial Number: 30 (0x1e) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U > S" > Validity: > Not Before: Thu Mar 07 00:11:54 2013 > Not After : Wed Mar 07 00:11:54 2018 > Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C > alifornia,C=US" > Subject Public Key Info: > Public Key Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > a9:54:bb:56:c3:03:c4:72:0a:2c:45:c3:cb:ba:87:6d: > bc:04:55:56:16:86:7d:fd:03:72:ce:2f:f0:cf:d4:7a: > 26:77:cb:0e:9c:d8:b7:b3:8b:b9:ed:05:ee:90:39:f9: > da:77:2f:cc:ff:71:7b:87:60:fd:e7:58:54:f5:91:fc: > 9b:d3:1c:96:5e:1a:01:8b:57:5c:3b:27:71:70:60:df: > e8:51:ac:b5:63:88:c4:e8:a8:be:59:44:fc:16:cb:07: > 34:a4:66:91:8e:86:af:9e:60:7c:c9:4f:4f:a9:c8:98: > d2:92:f5:d3:82:a5:ca:ec:32:d2:6a:33:19:59:60:a7 > Exponent: 65537 (0x10001) > Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption > Signature: > 00:6e:bd:37:11:a3:7e:b1:be:23:e0:87:25:87:c8:44: > 11:9a:46:bb:23:51:ab:49:66:0a:df:85:0b:98:53:53: > 7e:1d:9f:0b:94:67:ea:1f:ca:cd:c3:b4:78:b7:e3:2b: > da:7c:80:81:3c:27:6e:bc:5c:a5:55:a8:1f:41:83:be: > 40:14:f3:a0:10:9d:2b:e3:94:1c:0e:2d:d1:bd:f4:19: > b3:83:c5:f6:56:13:79:8e:61:92:45:2e:b9:f2:de:8a: > f5:0f:6c:bd:42:cf:5e:35:f2:20:3d:22:64:b5:25:41: > b4:ce:4c:1f:55:86:fa:64:e2:9a:64:af:ff:4e:e7:c8 > Fingerprint (MD5): > C3:C2:1D:D9:FE:09:79:EE:B4:26:7E:98:7B:34:DF:E5 > Fingerprint (SHA1): > AE:EA:43:E2:D0:15:6A:EB:0E:3B:7C:D2:6E:6F:62:C1:BB:5F:A9:0E > Friendly Name: Alice >tools.sh: #4324: Listing Alice.p12 (pk12util -l) - PASSED >tools.sh: Importing Alice's pk12 Alice.p12 file >pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw >pk12util: PKCS12 IMPORT SUCCESSFUL >tools.sh: #4325: Importing Alice.p12 (pk12util -i) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -c null >pk12util: Algorithm: "null": security library: invalid algorithm. >tools.sh: #4326: Exporting with [null:default] (pk12util -o) - PASSED >pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ > -k ../tests.pw -w ../tests.pw -C null >pk12util: PKCS12 EXPORT SUCCESSFUL >tools.sh: #4327: Exporting with [default:null] (pk12util -o) - PASSED >tools.sh: Create objsign cert ------------------------------- >signtool -G "objectsigner" -d ../tools/signdir -p "nss" >WARNING: Performing this operation while the browser is running could cause >corruption of your security databases. If the browser is currently running, >you should exit the browser before continuing this operation. Enter >"y" to continue, or anything else to abort: >Enter certificate information. All fields are optional. Acceptable >characters are numbers, letters, spaces, and apostrophes. >certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair >certificate request generated >certificate has been signed >certificate "objsigner" added to database >Exported certificate to x509.raw and x509.cacert. >tools.sh: #4328: Create objsign cert (signtool -G) - PASSED >tools.sh: Signing a jar of files ---------------------------- >signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ > ../tools/html >Generating ../tools/html/META-INF/manifest.mf file.. >--> sign.html >adding ../tools/html/sign.html to nojs.jar...(deflated 26%) >--> signjs.html >adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) >Generating zigbert.sf file.. >adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) >adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) >adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) >tree "../tools/html" signed successfully >tools.sh: #4329: Signing a jar of files (signtool -Z) - PASSED >tools.sh: Listing signed files in jar ---------------------- >signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner >archive "nojs.jar" has passed crypto verification. >found a MF master manifest file: META-INF/manifest.mf >found a SF signature manifest file: META-INF/zigbert.sf > md5 digest on global metainfo: match > sha digest on global metainfo: match >found a RSA signature file: META-INF/zigbert.rsa > status path > ------------ ------------------- > verified sign.html > verified signjs.html >tools.sh: #4330: Listing signed files in jar (signtool -v) - PASSED >tools.sh: Show who signed jar ------------------------------ >signtool -w nojs.jar -d ../tools/signdir >Signer information: >nickname: objsigner >subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org >issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org >tools.sh: #4331: Show who signed jar (signtool -w) - PASSED >tools.sh: Signing a xpi of files ---------------------------- >signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ > ../tools/html >Generating ../tools/html/META-INF/manifest.mf file.. >--> sign.html >--> signjs.html >Generating zigbert.sf file.. >Creating XPI Compatible Archive >adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) >--> sign.html >adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) >--> signjs.html >adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) >adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) >adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) >tree "../tools/html" signed successfully >tools.sh: #4332: Signing a xpi of files (signtool -Z -X) - PASSED >tools.sh: Listing signed files in xpi ---------------------- >signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner >archive "nojs.xpi" has passed crypto verification. >found a RSA signature file: META-INF/zigbert.rsa >found a MF master manifest file: META-INF/manifest.mf >found a SF signature manifest file: META-INF/zigbert.sf > md5 digest on global metainfo: match > sha digest on global metainfo: match > status path > ------------ ------------------- > verified sign.html > verified signjs.html >tools.sh: #4333: Listing signed files in xpi (signtool -v) - PASSED >tools.sh: Show who signed xpi ------------------------------ >signtool -w nojs.xpi -d ../tools/signdir >Signer information: >nickname: objsigner >subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org >issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org >tools.sh: #4334: Show who signed xpi (signtool -w) - PASSED >TIMESTAMP tools END: Wed Mar 6 17:21:30 MST 2013 >Running tests for fips >TIMESTAMP fips BEGIN: Wed Mar 6 17:21:30 MST 2013 >fips.sh: FIPS 140 Compliance Tests =============================== >fips.sh: Verify this module is in FIPS mode ----------------- >modutil -dbdir ../fips -list >Listing of PKCS #11 Modules >----------------------------------------------------------- > 1. NSS Internal FIPS PKCS #11 Module > slots: 1 slot attached > status: loaded > slot: NSS FIPS 140-2 User Private Key Services > token: NSS FIPS 140-2 Certificate DB > 2. RootCerts > library name: /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so > slots: 1 slot attached > status: loaded > slot: NSS Builtin Objects > token: Builtin Object Token >----------------------------------------------------------- >FIPS mode enabled. >fips.sh: #4335: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED >fips.sh: List the FIPS module certificates ----------------- >certutil -d ../fips -L >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >FIPS_PUB_140_Test_Certificate Cu,Cu,Cu >fips.sh: #4336: List the FIPS module certificates (certutil -L) . - PASSED >fips.sh: List the FIPS module keys ------------------------- >certutil -d ../fips -K -f ../tests.fipspw >certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" >< 0> dsa db9f30080d662d64f18f41967f827a71adc941a7 FIPS_PUB_140_Test_Certificate >fips.sh: #4337: List the FIPS module keys (certutil -K) . - PASSED >fips.sh: Attempt to list FIPS module keys with incorrect password >certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/tests.fipsbadpw >certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" >Incorrect password/PIN entered. >certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect. >fips.sh: #4338: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED >certutil -K returned 255 >fips.sh: Validate the certificate -------------------------- >certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw >certutil: certificate is valid >fips.sh: #4339: Validate the certificate (certutil -V -e) . - PASSED >fips.sh: Export the certificate and key as a PKCS#12 file -- >pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw >pk12util: PKCS12 EXPORT SUCCESSFUL >fips.sh: #4340: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED >fips.sh: Export the certificate as a DER-encoded file ------ >certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt >fips.sh: #4341: Export the certificate as a DER (certutil -L -r) . - PASSED >fips.sh: List the FIPS module certificates ----------------- >certutil -d ../fips -L >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >FIPS_PUB_140_Test_Certificate Cu,Cu,Cu >fips.sh: #4342: List the FIPS module certificates (certutil -L) . - PASSED >fips.sh: Delete the certificate and key from the FIPS module >certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw >fips.sh: #4343: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED >fips.sh: List the FIPS module certificates ----------------- >certutil -d ../fips -L >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >fips.sh: #4344: List the FIPS module certificates (certutil -L) . - PASSED >fips.sh: List the FIPS module keys. >certutil -d ../fips -K -f ../tests.fipspw >certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" >certutil: no keys found >fips.sh: #4345: List the FIPS module keys (certutil -K) . - PASSED >fips.sh: Import the certificate and key from the PKCS#12 file >pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw >pk12util: PKCS12 IMPORT SUCCESSFUL >fips.sh: #4346: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED >fips.sh: List the FIPS module certificates ----------------- >certutil -d ../fips -L >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >FIPS_PUB_140_Test_Certificate u,u,u >fips.sh: #4347: List the FIPS module certificates (certutil -L) . - PASSED >fips.sh: List the FIPS module keys -------------------------- >certutil -d ../fips -K -f ../tests.fipspw >certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" >< 0> dsa db9f30080d662d64f18f41967f827a71adc941a7 FIPS_PUB_140_Test_Certificate >fips.sh: #4348: List the FIPS module keys (certutil -K) . - PASSED >fips.sh: Delete the certificate from the FIPS module >certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate >fips.sh: #4349: Delete the certificate from the FIPS module (certutil -D) . - PASSED >fips.sh: List the FIPS module certificates ----------------- >certutil -d ../fips -L >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >fips.sh: #4350: List the FIPS module certificates (certutil -L) . - PASSED >fips.sh: Import the certificate and key from the PKCS#12 file >pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw >pk12util: PKCS12 IMPORT SUCCESSFUL >fips.sh: #4351: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED >fips.sh: List the FIPS module certificates ----------------- >certutil -d ../fips -L >Certificate Nickname Trust Attributes > SSL,S/MIME,JAR/XPI >FIPS_PUB_140_Test_Certificate u,u,u >fips.sh: #4352: List the FIPS module certificates (certutil -L) . - PASSED >fips.sh: List the FIPS module keys -------------------------- >certutil -d ../fips -K -f ../tests.fipspw >certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" >< 0> dsa db9f30080d662d64f18f41967f827a71adc941a7 FIPS_PUB_140_Test_Certificate >fips.sh: #4353: List the FIPS module keys (certutil -K) . - PASSED >fips.sh: Run PK11MODE in FIPSMODE ----------------- >pk11mode -d ../fips -p fips- -f ../tests.fipspw >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >Loaded FC_GetFunctionList for FIPS MODE; slotID 0 >**** Total number of TESTS ran in FIPS MODE is 106. **** >**** ALL TESTS PASSED **** >fips.sh: #4354: Run PK11MODE in FIPS mode (pk11mode) . - PASSED >fips.sh: Run PK11MODE in Non FIPSMODE ----------------- >pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >loaded C_GetFunctionList for NON FIPS MODE; slotID 1 >**** Total number of TESTS ran in NON FIPS MODE is 104. **** >**** ALL TESTS PASSED **** >fips.sh: #4355: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED >mkdir /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >mkdir: cannot create directory '/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle': File exists >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.chk /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssdbm.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssdbm3.chk /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssdbm3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssutil.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.chk /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >cp /builddir/build/BUILD/nss-3.14.3/mozilla/dist/Linux2.6_ppc_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle >fips.sh: Detect mangled softoken-------------------------- >mangling /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so >mangle -i /builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so -o -8 -b 5 >Changing byte 0x0015dc48 (1432648): from 5f (95) to 7f (127) >LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle dbtest -r -d ../fips >fips.sh: #4356: Init NSS with a corrupted library (dbtest -r) . - PASSED >fips.sh done >TIMESTAMP fips END: Wed Mar 6 17:21:59 MST 2013 >Running tests for crmf >TIMESTAMP crmf BEGIN: Wed Mar 6 17:21:59 MST 2013 >crmf.sh: CRMF/CMMF Tests =============================== >crmf.sh: CRMF/CMMF Tests ------------------------------ >crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode >crmftest v1.0 >Generating CRMF request >Decoding CRMF request >crmftest: Processing cert request 0 >crmftest: Processing cert request 1 >Exiting successfully!!! >crmf.sh: #4357: CRMF test . - PASSED >crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf >crmftest v1.0 >Doing CMMF Stuff >Exiting successfully!!! >crmf.sh: #4358: CMMF test . - PASSED >TIMESTAMP crmf END: Wed Mar 6 17:22:00 MST 2013 >Running tests for smime >TIMESTAMP smime BEGIN: Wed Mar 6 17:22:00 MST 2013 >smime.sh: S/MIME Tests =============================== >smime.sh: Signing Detached Message {SHA1} ------------------ >cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 >smime.sh: #4359: Create Detached Signature Alice (SHA1) . - PASSED >cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir >Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) >From: alice@bogus.com >Subject: message Alice --> Bob >To: bob@bogus.com >This is a test message from Alice to Bob. >smime.sh: #4360: Verifying Alice's Detached Signature (SHA1) . - PASSED >smime.sh: Signing Attached Message (SHA1) ------------------ >cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 >smime.sh: #4361: Create Attached Signature Alice (SHA1) . - PASSED >cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 >smime.sh: #4362: Decode Alice's Attached Signature (SHA1) . - PASSED >diff alice.txt alice.data.SHA1 >smime.sh: #4363: Compare Attached Signed Data and Original (SHA1) . - PASSED >smime.sh: Signing Detached Message {SHA256} ------------------ >cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 >smime.sh: #4364: Create Detached Signature Alice (SHA256) . - PASSED >cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir >Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) >From: alice@bogus.com >Subject: message Alice --> Bob >To: bob@bogus.com >This is a test message from Alice to Bob. >smime.sh: #4365: Verifying Alice's Detached Signature (SHA256) . - PASSED >smime.sh: Signing Attached Message (SHA256) ------------------ >cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 >smime.sh: #4366: Create Attached Signature Alice (SHA256) . - PASSED >cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 >smime.sh: #4367: Decode Alice's Attached Signature (SHA256) . - PASSED >diff alice.txt alice.data.SHA256 >smime.sh: #4368: Compare Attached Signed Data and Original (SHA256) . - PASSED >smime.sh: Signing Detached Message {SHA384} ------------------ >cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 >smime.sh: #4369: Create Detached Signature Alice (SHA384) . - PASSED >cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir >Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) >From: alice@bogus.com >Subject: message Alice --> Bob >To: bob@bogus.com >This is a test message from Alice to Bob. >smime.sh: #4370: Verifying Alice's Detached Signature (SHA384) . - PASSED >smime.sh: Signing Attached Message (SHA384) ------------------ >cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 >smime.sh: #4371: Create Attached Signature Alice (SHA384) . - PASSED >cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 >smime.sh: #4372: Decode Alice's Attached Signature (SHA384) . - PASSED >diff alice.txt alice.data.SHA384 >smime.sh: #4373: Compare Attached Signed Data and Original (SHA384) . - PASSED >smime.sh: Signing Detached Message {SHA512} ------------------ >cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 >smime.sh: #4374: Create Detached Signature Alice (SHA512) . - PASSED >cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir >Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) >From: alice@bogus.com >Subject: message Alice --> Bob >To: bob@bogus.com >This is a test message from Alice to Bob. >smime.sh: #4375: Verifying Alice's Detached Signature (SHA512) . - PASSED >smime.sh: Signing Attached Message (SHA512) ------------------ >cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 >smime.sh: #4376: Create Attached Signature Alice (SHA512) . - PASSED >cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 >smime.sh: #4377: Decode Alice's Attached Signature (SHA512) . - PASSED >diff alice.txt alice.data.SHA512 >smime.sh: #4378: Compare Attached Signed Data and Original (SHA512) . - PASSED >smime.sh: Enveloped Data Tests ------------------------------ >cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ > -o alice.env >smime.sh: #4379: Create Enveloped Data Alice . - PASSED >cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 >smime.sh: #4380: Decode Enveloped Data Alice . - PASSED >diff alice.txt alice.data1 >smime.sh: #4381: Compare Decoded Enveloped Data and Original . - PASSED >smime.sh: Testing multiple recipients ------------------------------ >cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ > -r bob@bogus.com,dave@bogus.com >smime.sh: #4382: Create Multiple Recipients Enveloped Data Alice . - PASSED >smime.sh: Testing multiple email addrs ------------------------------ >cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ > -r eve@bogus.net >smime.sh: #4383: Encrypt to a Multiple Email cert . - PASSED >cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 >smime.sh: #4384: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED >cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 >smime.sh: #4385: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED >cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 >smime.sh: #4386: Decrypt with a Multiple Email cert . - PASSED >smime.sh: #4387: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED >smime.sh: #4388: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED >smime.sh: #4389: Compare Decoded with Multiple Email cert . - PASSED >smime.sh: Sending CERTS-ONLY Message ------------------------------ >cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ > -d ../alicedir > co.der >smime.sh: #4390: Create Certs-Only Alice . - PASSED >cmsutil -D -i co.der -d ../bobdir >smime.sh: #4391: Verify Certs-Only by CA . - PASSED >smime.sh: Encrypted-Data Message --------------------------------- >cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ > -r "bob@bogus.com" > alice.enc >smime.sh: #4392: Create Encrypted-Data . - PASSED >cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ > -o alice.data2 >smime.sh: #4393: Decode Encrypted-Data . - PASSED >smime.sh: #4394: Compare Decoded and Original Data . - PASSED >smime.sh: p7 util Data Tests ------------------------------ >p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env >smime.sh: #4395: Creating envelope for user Alice . - PASSED >p7content -d ../alicedir -i alice.env -o alice_p7.data >smime.sh: #4396: Verifying file delivered to user Alice . - PASSED >diff alice.txt alice_p7.data.sed >smime.sh: #4397: Compare Decoded Enveloped Data and Original . - PASSED >p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e >smime.sh: #4398: Signing file for user Alice . - PASSED >p7verify -d ../alicedir -c alice.txt -s alice.sig >Signature is valid. >smime.sh: #4399: Verifying file delivered to user Alice . - PASSED >TIMESTAMP smime END: Wed Mar 6 17:22:04 MST 2013 >Running tests for ssl >TIMESTAMP ssl BEGIN: Wed Mar 6 17:22:04 MST 2013 >ssl.sh: SSL tests =============================== >ssl.sh: CRL SSL Client Tests =============================== >ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:04 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 19659 >/dev/null 2>/dev/null >selfserv_9218 with PID 19659 found at Wed Mar 6 17:22:04 MST 2013 >selfserv_9218 with PID 19659 started at Wed Mar 6 17:22:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4400: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 19659 at Wed Mar 6 17:22:04 MST 2013 >kill -USR1 19659 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 19659 killed at Wed Mar 6 17:22:04 MST 2013 >ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:04 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 19715 >/dev/null 2>/dev/null >selfserv_9218 with PID 19715 found at Wed Mar 6 17:22:04 MST 2013 >selfserv_9218 with PID 19715 started at Wed Mar 6 17:22:04 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4401: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 19715 at Wed Mar 6 17:22:05 MST 2013 >kill -USR1 19715 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 19715 killed at Wed Mar 6 17:22:05 MST 2013 >ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:05 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 19771 >/dev/null 2>/dev/null >selfserv_9218 with PID 19771 found at Wed Mar 6 17:22:05 MST 2013 >selfserv_9218 with PID 19771 started at Wed Mar 6 17:22:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4402: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 19771 at Wed Mar 6 17:22:05 MST 2013 >kill -USR1 19771 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 19771 killed at Wed Mar 6 17:22:05 MST 2013 >ssl.sh: TLS Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:05 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 19839 >/dev/null 2>/dev/null >selfserv_9218 with PID 19839 found at Wed Mar 6 17:22:05 MST 2013 >selfserv_9218 with PID 19839 started at Wed Mar 6 17:22:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4403: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 19839 at Wed Mar 6 17:22:05 MST 2013 >kill -USR1 19839 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 19839 killed at Wed Mar 6 17:22:05 MST 2013 >ssl.sh: TLS Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:05 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 19895 >/dev/null 2>/dev/null >selfserv_9218 with PID 19895 found at Wed Mar 6 17:22:05 MST 2013 >selfserv_9218 with PID 19895 started at Wed Mar 6 17:22:05 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4404: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 19895 at Wed Mar 6 17:22:06 MST 2013 >kill -USR1 19895 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 19895 killed at Wed Mar 6 17:22:06 MST 2013 >ssl.sh: TLS Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:06 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 19951 >/dev/null 2>/dev/null >selfserv_9218 with PID 19951 found at Wed Mar 6 17:22:06 MST 2013 >selfserv_9218 with PID 19951 started at Wed Mar 6 17:22:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4405: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 19951 at Wed Mar 6 17:22:06 MST 2013 >kill -USR1 19951 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 19951 killed at Wed Mar 6 17:22:06 MST 2013 >ssl.sh: TLS Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:06 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 20019 >/dev/null 2>/dev/null >selfserv_9218 with PID 20019 found at Wed Mar 6 17:22:06 MST 2013 >selfserv_9218 with PID 20019 started at Wed Mar 6 17:22:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #4406: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 20019 at Wed Mar 6 17:22:06 MST 2013 >kill -USR1 20019 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 20019 killed at Wed Mar 6 17:22:06 MST 2013 >ssl.sh: TLS Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:06 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 20075 >/dev/null 2>/dev/null >selfserv_9218 with PID 20075 found at Wed Mar 6 17:22:06 MST 2013 >selfserv_9218 with PID 20075 started at Wed Mar 6 17:22:06 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4407: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 20075 at Wed Mar 6 17:22:07 MST 2013 >kill -USR1 20075 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 20075 killed at Wed Mar 6 17:22:07 MST 2013 >ssl.sh: TLS Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:07 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 20131 >/dev/null 2>/dev/null >selfserv_9218 with PID 20131 found at Wed Mar 6 17:22:07 MST 2013 >selfserv_9218 with PID 20131 started at Wed Mar 6 17:22:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #4408: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 20131 at Wed Mar 6 17:22:07 MST 2013 >kill -USR1 20131 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 20131 killed at Wed Mar 6 17:22:07 MST 2013 >ssl.sh: TLS Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:07 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 20199 >/dev/null 2>/dev/null >selfserv_9218 with PID 20199 found at Wed Mar 6 17:22:07 MST 2013 >selfserv_9218 with PID 20199 started at Wed Mar 6 17:22:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #4409: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 20199 at Wed Mar 6 17:22:07 MST 2013 >kill -USR1 20199 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 20199 killed at Wed Mar 6 17:22:07 MST 2013 >ssl.sh: TLS Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:07 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 20255 >/dev/null 2>/dev/null >selfserv_9218 with PID 20255 found at Wed Mar 6 17:22:07 MST 2013 >selfserv_9218 with PID 20255 started at Wed Mar 6 17:22:07 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #4410: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 20255 at Wed Mar 6 17:22:08 MST 2013 >kill -USR1 20255 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 20255 killed at Wed Mar 6 17:22:08 MST 2013 >ssl.sh: TLS Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 20311 >/dev/null 2>/dev/null >selfserv_9218 with PID 20311 found at Wed Mar 6 17:22:08 MST 2013 >selfserv_9218 with PID 20311 started at Wed Mar 6 17:22:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #4411: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 20311 at Wed Mar 6 17:22:08 MST 2013 >kill -USR1 20311 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 20311 killed at Wed Mar 6 17:22:08 MST 2013 >ssl.sh: TLS Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 20379 >/dev/null 2>/dev/null >selfserv_9218 with PID 20379 found at Wed Mar 6 17:22:08 MST 2013 >selfserv_9218 with PID 20379 started at Wed Mar 6 17:22:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #4412: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 20379 at Wed Mar 6 17:22:08 MST 2013 >kill -USR1 20379 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 20379 killed at Wed Mar 6 17:22:08 MST 2013 >ssl.sh: TLS Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:08 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 20435 >/dev/null 2>/dev/null >selfserv_9218 with PID 20435 found at Wed Mar 6 17:22:08 MST 2013 >selfserv_9218 with PID 20435 started at Wed Mar 6 17:22:08 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #4413: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 20435 at Wed Mar 6 17:22:09 MST 2013 >kill -USR1 20435 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 20435 killed at Wed Mar 6 17:22:09 MST 2013 >ssl.sh: TLS Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:09 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 20491 >/dev/null 2>/dev/null >selfserv_9218 with PID 20491 found at Wed Mar 6 17:22:09 MST 2013 >selfserv_9218 with PID 20491 started at Wed Mar 6 17:22:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #4414: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 20491 at Wed Mar 6 17:22:09 MST 2013 >kill -USR1 20491 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 20491 killed at Wed Mar 6 17:22:09 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:09 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 20559 >/dev/null 2>/dev/null >selfserv_9218 with PID 20559 found at Wed Mar 6 17:22:09 MST 2013 >selfserv_9218 with PID 20559 started at Wed Mar 6 17:22:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #4415: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 20559 at Wed Mar 6 17:22:09 MST 2013 >kill -USR1 20559 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 20559 killed at Wed Mar 6 17:22:09 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:09 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 20615 >/dev/null 2>/dev/null >selfserv_9218 with PID 20615 found at Wed Mar 6 17:22:09 MST 2013 >selfserv_9218 with PID 20615 started at Wed Mar 6 17:22:09 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4416: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 20615 at Wed Mar 6 17:22:10 MST 2013 >kill -USR1 20615 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 20615 killed at Wed Mar 6 17:22:10 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 20671 >/dev/null 2>/dev/null >selfserv_9218 with PID 20671 found at Wed Mar 6 17:22:10 MST 2013 >selfserv_9218 with PID 20671 started at Wed Mar 6 17:22:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #4417: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 20671 at Wed Mar 6 17:22:10 MST 2013 >kill -USR1 20671 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 20671 killed at Wed Mar 6 17:22:10 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 20739 >/dev/null 2>/dev/null >selfserv_9218 with PID 20739 found at Wed Mar 6 17:22:10 MST 2013 >selfserv_9218 with PID 20739 started at Wed Mar 6 17:22:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4418: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 20739 at Wed Mar 6 17:22:10 MST 2013 >kill -USR1 20739 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 20739 killed at Wed Mar 6 17:22:10 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 20795 >/dev/null 2>/dev/null >selfserv_9218 with PID 20795 found at Wed Mar 6 17:22:10 MST 2013 >selfserv_9218 with PID 20795 started at Wed Mar 6 17:22:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4419: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 20795 at Wed Mar 6 17:22:10 MST 2013 >kill -USR1 20795 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 20795 killed at Wed Mar 6 17:22:10 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 20851 >/dev/null 2>/dev/null >selfserv_9218 with PID 20851 found at Wed Mar 6 17:22:11 MST 2013 >selfserv_9218 with PID 20851 started at Wed Mar 6 17:22:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4420: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 20851 at Wed Mar 6 17:22:11 MST 2013 >kill -USR1 20851 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 20851 killed at Wed Mar 6 17:22:11 MST 2013 >ssl.sh: SSL3 Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 20919 >/dev/null 2>/dev/null >selfserv_9218 with PID 20919 found at Wed Mar 6 17:22:11 MST 2013 >selfserv_9218 with PID 20919 started at Wed Mar 6 17:22:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4421: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 20919 at Wed Mar 6 17:22:11 MST 2013 >kill -USR1 20919 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 20919 killed at Wed Mar 6 17:22:11 MST 2013 >ssl.sh: SSL3 Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 20975 >/dev/null 2>/dev/null >selfserv_9218 with PID 20975 found at Wed Mar 6 17:22:11 MST 2013 >selfserv_9218 with PID 20975 started at Wed Mar 6 17:22:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4422: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 20975 at Wed Mar 6 17:22:11 MST 2013 >kill -USR1 20975 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 20975 killed at Wed Mar 6 17:22:11 MST 2013 >ssl.sh: SSL3 Request don't require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:11 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 21031 >/dev/null 2>/dev/null >selfserv_9218 with PID 21031 found at Wed Mar 6 17:22:11 MST 2013 >selfserv_9218 with PID 21031 started at Wed Mar 6 17:22:11 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4423: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 21031 at Wed Mar 6 17:22:12 MST 2013 >kill -USR1 21031 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 21031 killed at Wed Mar 6 17:22:12 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:12 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 21099 >/dev/null 2>/dev/null >selfserv_9218 with PID 21099 found at Wed Mar 6 17:22:12 MST 2013 >selfserv_9218 with PID 21099 started at Wed Mar 6 17:22:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #4424: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 21099 at Wed Mar 6 17:22:12 MST 2013 >kill -USR1 21099 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 21099 killed at Wed Mar 6 17:22:12 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:12 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 21155 >/dev/null 2>/dev/null >selfserv_9218 with PID 21155 found at Wed Mar 6 17:22:12 MST 2013 >selfserv_9218 with PID 21155 started at Wed Mar 6 17:22:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4425: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 21155 at Wed Mar 6 17:22:12 MST 2013 >kill -USR1 21155 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 21155 killed at Wed Mar 6 17:22:12 MST 2013 >ssl.sh: SSL3 Request don't require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:12 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 21211 >/dev/null 2>/dev/null >selfserv_9218 with PID 21211 found at Wed Mar 6 17:22:12 MST 2013 >selfserv_9218 with PID 21211 started at Wed Mar 6 17:22:12 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #4426: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 21211 at Wed Mar 6 17:22:13 MST 2013 >kill -USR1 21211 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 21211 killed at Wed Mar 6 17:22:13 MST 2013 >ssl.sh: SSL3 Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:13 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 21279 >/dev/null 2>/dev/null >selfserv_9218 with PID 21279 found at Wed Mar 6 17:22:13 MST 2013 >selfserv_9218 with PID 21279 started at Wed Mar 6 17:22:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #4427: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 21279 at Wed Mar 6 17:22:13 MST 2013 >kill -USR1 21279 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 21279 killed at Wed Mar 6 17:22:13 MST 2013 >ssl.sh: SSL3 Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:13 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 21335 >/dev/null 2>/dev/null >selfserv_9218 with PID 21335 found at Wed Mar 6 17:22:13 MST 2013 >selfserv_9218 with PID 21335 started at Wed Mar 6 17:22:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #4428: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 21335 at Wed Mar 6 17:22:13 MST 2013 >kill -USR1 21335 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 21335 killed at Wed Mar 6 17:22:13 MST 2013 >ssl.sh: SSL3 Require client auth (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:13 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 21391 >/dev/null 2>/dev/null >selfserv_9218 with PID 21391 found at Wed Mar 6 17:22:13 MST 2013 >selfserv_9218 with PID 21391 started at Wed Mar 6 17:22:13 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #4429: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 21391 at Wed Mar 6 17:22:14 MST 2013 >kill -USR1 21391 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 21391 killed at Wed Mar 6 17:22:14 MST 2013 >ssl.sh: SSL3 Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:14 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 21459 >/dev/null 2>/dev/null >selfserv_9218 with PID 21459 found at Wed Mar 6 17:22:14 MST 2013 >selfserv_9218 with PID 21459 started at Wed Mar 6 17:22:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #4430: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 21459 at Wed Mar 6 17:22:14 MST 2013 >kill -USR1 21459 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 21459 killed at Wed Mar 6 17:22:14 MST 2013 >ssl.sh: SSL3 Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:14 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 21515 >/dev/null 2>/dev/null >selfserv_9218 with PID 21515 found at Wed Mar 6 17:22:14 MST 2013 >selfserv_9218 with PID 21515 started at Wed Mar 6 17:22:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #4431: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 21515 at Wed Mar 6 17:22:14 MST 2013 >kill -USR1 21515 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 21515 killed at Wed Mar 6 17:22:14 MST 2013 >ssl.sh: SSL3 Require client auth (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:14 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 21571 >/dev/null 2>/dev/null >selfserv_9218 with PID 21571 found at Wed Mar 6 17:22:14 MST 2013 >selfserv_9218 with PID 21571 started at Wed Mar 6 17:22:14 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 254 >ssl.sh: #4432: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 21571 at Wed Mar 6 17:22:15 MST 2013 >kill -USR1 21571 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 21571 killed at Wed Mar 6 17:22:15 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:15 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 21639 >/dev/null 2>/dev/null >selfserv_9218 with PID 21639 found at Wed Mar 6 17:22:15 MST 2013 >selfserv_9218 with PID 21639 started at Wed Mar 6 17:22:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #4433: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 21639 at Wed Mar 6 17:22:15 MST 2013 >kill -USR1 21639 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 21639 killed at Wed Mar 6 17:22:15 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:15 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 21695 >/dev/null 2>/dev/null >selfserv_9218 with PID 21695 found at Wed Mar 6 17:22:15 MST 2013 >selfserv_9218 with PID 21695 started at Wed Mar 6 17:22:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4434: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 21695 at Wed Mar 6 17:22:15 MST 2013 >kill -USR1 21695 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 21695 killed at Wed Mar 6 17:22:15 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:15 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 21751 >/dev/null 2>/dev/null >selfserv_9218 with PID 21751 found at Wed Mar 6 17:22:15 MST 2013 >selfserv_9218 with PID 21751 started at Wed Mar 6 17:22:15 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >ssl.sh: #4435: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 21751 at Wed Mar 6 17:22:16 MST 2013 >kill -USR1 21751 >selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 21751 killed at Wed Mar 6 17:22:16 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:16 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 21819 >/dev/null 2>/dev/null >selfserv_9218 with PID 21819 found at Wed Mar 6 17:22:16 MST 2013 >selfserv_9218 with PID 21819 started at Wed Mar 6 17:22:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4436: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 21819 at Wed Mar 6 17:22:16 MST 2013 >kill -USR1 21819 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 21819 killed at Wed Mar 6 17:22:16 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:16 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 21875 >/dev/null 2>/dev/null >selfserv_9218 with PID 21875 found at Wed Mar 6 17:22:16 MST 2013 >selfserv_9218 with PID 21875 started at Wed Mar 6 17:22:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4437: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 21875 at Wed Mar 6 17:22:16 MST 2013 >kill -USR1 21875 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 21875 killed at Wed Mar 6 17:22:16 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:16 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 21931 >/dev/null 2>/dev/null >selfserv_9218 with PID 21931 found at Wed Mar 6 17:22:16 MST 2013 >selfserv_9218 with PID 21931 started at Wed Mar 6 17:22:16 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4438: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 21931 at Wed Mar 6 17:22:17 MST 2013 >kill -USR1 21931 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 21931 killed at Wed Mar 6 17:22:17 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:17 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:17 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 21999 >/dev/null 2>/dev/null >selfserv_9218 with PID 21999 found at Wed Mar 6 17:22:17 MST 2013 >selfserv_9218 with PID 21999 started at Wed Mar 6 17:22:17 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4439: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 21999 at Wed Mar 6 17:22:17 MST 2013 >kill -USR1 21999 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 21999 killed at Wed Mar 6 17:22:17 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:17 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:17 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 22055 >/dev/null 2>/dev/null >selfserv_9218 with PID 22055 found at Wed Mar 6 17:22:17 MST 2013 >selfserv_9218 with PID 22055 started at Wed Mar 6 17:22:17 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4440: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 22055 at Wed Mar 6 17:22:17 MST 2013 >kill -USR1 22055 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 22055 killed at Wed Mar 6 17:22:17 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:17 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:17 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 22111 >/dev/null 2>/dev/null >selfserv_9218 with PID 22111 found at Wed Mar 6 17:22:17 MST 2013 >selfserv_9218 with PID 22111 started at Wed Mar 6 17:22:17 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4441: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 22111 at Wed Mar 6 17:22:18 MST 2013 >kill -USR1 22111 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 22111 killed at Wed Mar 6 17:22:18 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:18 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 22179 >/dev/null 2>/dev/null >selfserv_9218 with PID 22179 found at Wed Mar 6 17:22:18 MST 2013 >selfserv_9218 with PID 22179 started at Wed Mar 6 17:22:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #4442: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 22179 at Wed Mar 6 17:22:18 MST 2013 >kill -USR1 22179 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 22179 killed at Wed Mar 6 17:22:18 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:18 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 22235 >/dev/null 2>/dev/null >selfserv_9218 with PID 22235 found at Wed Mar 6 17:22:18 MST 2013 >selfserv_9218 with PID 22235 started at Wed Mar 6 17:22:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4443: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 22235 at Wed Mar 6 17:22:18 MST 2013 >kill -USR1 22235 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 22235 killed at Wed Mar 6 17:22:18 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:18 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 22291 >/dev/null 2>/dev/null >selfserv_9218 with PID 22291 found at Wed Mar 6 17:22:18 MST 2013 >selfserv_9218 with PID 22291 started at Wed Mar 6 17:22:18 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #4444: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 22291 at Wed Mar 6 17:22:19 MST 2013 >kill -USR1 22291 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 22291 killed at Wed Mar 6 17:22:19 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:19 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 22359 >/dev/null 2>/dev/null >selfserv_9218 with PID 22359 found at Wed Mar 6 17:22:19 MST 2013 >selfserv_9218 with PID 22359 started at Wed Mar 6 17:22:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #4445: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 22359 at Wed Mar 6 17:22:19 MST 2013 >kill -USR1 22359 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 22359 killed at Wed Mar 6 17:22:19 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:19 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 22415 >/dev/null 2>/dev/null >selfserv_9218 with PID 22415 found at Wed Mar 6 17:22:19 MST 2013 >selfserv_9218 with PID 22415 started at Wed Mar 6 17:22:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #4446: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 22415 at Wed Mar 6 17:22:19 MST 2013 >kill -USR1 22415 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 22415 killed at Wed Mar 6 17:22:19 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:19 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 22471 >/dev/null 2>/dev/null >selfserv_9218 with PID 22471 found at Wed Mar 6 17:22:19 MST 2013 >selfserv_9218 with PID 22471 started at Wed Mar 6 17:22:19 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #4447: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 22471 at Wed Mar 6 17:22:20 MST 2013 >kill -USR1 22471 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 22471 killed at Wed Mar 6 17:22:20 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:20 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 22539 >/dev/null 2>/dev/null >selfserv_9218 with PID 22539 found at Wed Mar 6 17:22:20 MST 2013 >selfserv_9218 with PID 22539 started at Wed Mar 6 17:22:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #4448: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 22539 at Wed Mar 6 17:22:20 MST 2013 >kill -USR1 22539 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 22539 killed at Wed Mar 6 17:22:20 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:20 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 22595 >/dev/null 2>/dev/null >selfserv_9218 with PID 22595 found at Wed Mar 6 17:22:20 MST 2013 >selfserv_9218 with PID 22595 started at Wed Mar 6 17:22:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #4449: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 22595 at Wed Mar 6 17:22:20 MST 2013 >kill -USR1 22595 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 22595 killed at Wed Mar 6 17:22:20 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:20 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 22651 >/dev/null 2>/dev/null >selfserv_9218 with PID 22651 found at Wed Mar 6 17:22:20 MST 2013 >selfserv_9218 with PID 22651 started at Wed Mar 6 17:22:20 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #4450: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 22651 at Wed Mar 6 17:22:21 MST 2013 >kill -USR1 22651 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 22651 killed at Wed Mar 6 17:22:21 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:21 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 22719 >/dev/null 2>/dev/null >selfserv_9218 with PID 22719 found at Wed Mar 6 17:22:21 MST 2013 >selfserv_9218 with PID 22719 started at Wed Mar 6 17:22:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #4451: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 22719 at Wed Mar 6 17:22:21 MST 2013 >kill -USR1 22719 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 22719 killed at Wed Mar 6 17:22:21 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:21 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 22775 >/dev/null 2>/dev/null >selfserv_9218 with PID 22775 found at Wed Mar 6 17:22:21 MST 2013 >selfserv_9218 with PID 22775 started at Wed Mar 6 17:22:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4452: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 22775 at Wed Mar 6 17:22:21 MST 2013 >kill -USR1 22775 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 22775 killed at Wed Mar 6 17:22:21 MST 2013 >ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:21 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 22831 >/dev/null 2>/dev/null >selfserv_9218 with PID 22831 found at Wed Mar 6 17:22:21 MST 2013 >selfserv_9218 with PID 22831 started at Wed Mar 6 17:22:21 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #4453: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 22831 at Wed Mar 6 17:22:22 MST 2013 >kill -USR1 22831 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 22831 killed at Wed Mar 6 17:22:22 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:22 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 22899 >/dev/null 2>/dev/null >selfserv_9218 with PID 22899 found at Wed Mar 6 17:22:22 MST 2013 >selfserv_9218 with PID 22899 started at Wed Mar 6 17:22:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4454: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 22899 at Wed Mar 6 17:22:22 MST 2013 >kill -USR1 22899 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 22899 killed at Wed Mar 6 17:22:22 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:22 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 22955 >/dev/null 2>/dev/null >selfserv_9218 with PID 22955 found at Wed Mar 6 17:22:22 MST 2013 >selfserv_9218 with PID 22955 started at Wed Mar 6 17:22:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4455: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 22955 at Wed Mar 6 17:22:22 MST 2013 >kill -USR1 22955 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 22955 killed at Wed Mar 6 17:22:22 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:22 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 23011 >/dev/null 2>/dev/null >selfserv_9218 with PID 23011 found at Wed Mar 6 17:22:22 MST 2013 >selfserv_9218 with PID 23011 started at Wed Mar 6 17:22:22 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4456: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 23011 at Wed Mar 6 17:22:23 MST 2013 >kill -USR1 23011 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 23011 killed at Wed Mar 6 17:22:23 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:23 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 23079 >/dev/null 2>/dev/null >selfserv_9218 with PID 23079 found at Wed Mar 6 17:22:23 MST 2013 >selfserv_9218 with PID 23079 started at Wed Mar 6 17:22:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4457: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 23079 at Wed Mar 6 17:22:23 MST 2013 >kill -USR1 23079 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 23079 killed at Wed Mar 6 17:22:23 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:23 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 23135 >/dev/null 2>/dev/null >selfserv_9218 with PID 23135 found at Wed Mar 6 17:22:23 MST 2013 >selfserv_9218 with PID 23135 started at Wed Mar 6 17:22:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4458: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 23135 at Wed Mar 6 17:22:23 MST 2013 >kill -USR1 23135 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 23135 killed at Wed Mar 6 17:22:23 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:23 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 23191 >/dev/null 2>/dev/null >selfserv_9218 with PID 23191 found at Wed Mar 6 17:22:23 MST 2013 >selfserv_9218 with PID 23191 started at Wed Mar 6 17:22:23 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4459: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 23191 at Wed Mar 6 17:22:24 MST 2013 >kill -USR1 23191 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 23191 killed at Wed Mar 6 17:22:24 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:24 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 23259 >/dev/null 2>/dev/null >selfserv_9218 with PID 23259 found at Wed Mar 6 17:22:24 MST 2013 >selfserv_9218 with PID 23259 started at Wed Mar 6 17:22:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #4460: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 23259 at Wed Mar 6 17:22:24 MST 2013 >kill -USR1 23259 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 23259 killed at Wed Mar 6 17:22:24 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:24 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 23315 >/dev/null 2>/dev/null >selfserv_9218 with PID 23315 found at Wed Mar 6 17:22:24 MST 2013 >selfserv_9218 with PID 23315 started at Wed Mar 6 17:22:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4461: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 23315 at Wed Mar 6 17:22:24 MST 2013 >kill -USR1 23315 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 23315 killed at Wed Mar 6 17:22:24 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:24 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 23371 >/dev/null 2>/dev/null >selfserv_9218 with PID 23371 found at Wed Mar 6 17:22:24 MST 2013 >selfserv_9218 with PID 23371 started at Wed Mar 6 17:22:24 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #4462: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 23371 at Wed Mar 6 17:22:25 MST 2013 >kill -USR1 23371 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 23371 killed at Wed Mar 6 17:22:25 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:25 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 23439 >/dev/null 2>/dev/null >selfserv_9218 with PID 23439 found at Wed Mar 6 17:22:25 MST 2013 >selfserv_9218 with PID 23439 started at Wed Mar 6 17:22:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #4463: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 23439 at Wed Mar 6 17:22:25 MST 2013 >kill -USR1 23439 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 23439 killed at Wed Mar 6 17:22:25 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:25 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 23495 >/dev/null 2>/dev/null >selfserv_9218 with PID 23495 found at Wed Mar 6 17:22:25 MST 2013 >selfserv_9218 with PID 23495 started at Wed Mar 6 17:22:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #4464: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 23495 at Wed Mar 6 17:22:25 MST 2013 >kill -USR1 23495 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 23495 killed at Wed Mar 6 17:22:25 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:25 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 23551 >/dev/null 2>/dev/null >selfserv_9218 with PID 23551 found at Wed Mar 6 17:22:25 MST 2013 >selfserv_9218 with PID 23551 started at Wed Mar 6 17:22:25 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #4465: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 23551 at Wed Mar 6 17:22:25 MST 2013 >kill -USR1 23551 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 23551 killed at Wed Mar 6 17:22:26 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:26 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 23619 >/dev/null 2>/dev/null >selfserv_9218 with PID 23619 found at Wed Mar 6 17:22:26 MST 2013 >selfserv_9218 with PID 23619 started at Wed Mar 6 17:22:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #4466: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 23619 at Wed Mar 6 17:22:26 MST 2013 >kill -USR1 23619 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 23619 killed at Wed Mar 6 17:22:26 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:26 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 23675 >/dev/null 2>/dev/null >selfserv_9218 with PID 23675 found at Wed Mar 6 17:22:26 MST 2013 >selfserv_9218 with PID 23675 started at Wed Mar 6 17:22:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #4467: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 23675 at Wed Mar 6 17:22:26 MST 2013 >kill -USR1 23675 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 23675 killed at Wed Mar 6 17:22:26 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:26 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 23731 >/dev/null 2>/dev/null >selfserv_9218 with PID 23731 found at Wed Mar 6 17:22:26 MST 2013 >selfserv_9218 with PID 23731 started at Wed Mar 6 17:22:26 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #4468: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 23731 at Wed Mar 6 17:22:26 MST 2013 >kill -USR1 23731 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 23731 killed at Wed Mar 6 17:22:26 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:27 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 23799 >/dev/null 2>/dev/null >selfserv_9218 with PID 23799 found at Wed Mar 6 17:22:27 MST 2013 >selfserv_9218 with PID 23799 started at Wed Mar 6 17:22:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #4469: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 23799 at Wed Mar 6 17:22:27 MST 2013 >kill -USR1 23799 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 23799 killed at Wed Mar 6 17:22:27 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:27 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 23855 >/dev/null 2>/dev/null >selfserv_9218 with PID 23855 found at Wed Mar 6 17:22:27 MST 2013 >selfserv_9218 with PID 23855 started at Wed Mar 6 17:22:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4470: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 23855 at Wed Mar 6 17:22:27 MST 2013 >kill -USR1 23855 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 23855 killed at Wed Mar 6 17:22:27 MST 2013 >ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:27 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 23911 >/dev/null 2>/dev/null >selfserv_9218 with PID 23911 found at Wed Mar 6 17:22:27 MST 2013 >selfserv_9218 with PID 23911 started at Wed Mar 6 17:22:27 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #4471: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 23911 at Wed Mar 6 17:22:27 MST 2013 >kill -USR1 23911 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 23911 killed at Wed Mar 6 17:22:27 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:28 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 23979 >/dev/null 2>/dev/null >selfserv_9218 with PID 23979 found at Wed Mar 6 17:22:28 MST 2013 >selfserv_9218 with PID 23979 started at Wed Mar 6 17:22:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4472: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 23979 at Wed Mar 6 17:22:28 MST 2013 >kill -USR1 23979 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 23979 killed at Wed Mar 6 17:22:28 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:28 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 24035 >/dev/null 2>/dev/null >selfserv_9218 with PID 24035 found at Wed Mar 6 17:22:28 MST 2013 >selfserv_9218 with PID 24035 started at Wed Mar 6 17:22:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4473: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 24035 at Wed Mar 6 17:22:28 MST 2013 >kill -USR1 24035 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 24035 killed at Wed Mar 6 17:22:28 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:28 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 24091 >/dev/null 2>/dev/null >selfserv_9218 with PID 24091 found at Wed Mar 6 17:22:28 MST 2013 >selfserv_9218 with PID 24091 started at Wed Mar 6 17:22:28 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4474: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 24091 at Wed Mar 6 17:22:28 MST 2013 >kill -USR1 24091 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 24091 killed at Wed Mar 6 17:22:28 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:29 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 24159 >/dev/null 2>/dev/null >selfserv_9218 with PID 24159 found at Wed Mar 6 17:22:29 MST 2013 >selfserv_9218 with PID 24159 started at Wed Mar 6 17:22:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4475: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 24159 at Wed Mar 6 17:22:29 MST 2013 >kill -USR1 24159 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 24159 killed at Wed Mar 6 17:22:29 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:29 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 24215 >/dev/null 2>/dev/null >selfserv_9218 with PID 24215 found at Wed Mar 6 17:22:29 MST 2013 >selfserv_9218 with PID 24215 started at Wed Mar 6 17:22:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4476: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 24215 at Wed Mar 6 17:22:29 MST 2013 >kill -USR1 24215 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 24215 killed at Wed Mar 6 17:22:29 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:29 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 24271 >/dev/null 2>/dev/null >selfserv_9218 with PID 24271 found at Wed Mar 6 17:22:29 MST 2013 >selfserv_9218 with PID 24271 started at Wed Mar 6 17:22:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4477: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 24271 at Wed Mar 6 17:22:29 MST 2013 >kill -USR1 24271 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 24271 killed at Wed Mar 6 17:22:29 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:29 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:29 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 24339 >/dev/null 2>/dev/null >selfserv_9218 with PID 24339 found at Wed Mar 6 17:22:30 MST 2013 >selfserv_9218 with PID 24339 started at Wed Mar 6 17:22:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #4478: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 24339 at Wed Mar 6 17:22:30 MST 2013 >kill -USR1 24339 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 24339 killed at Wed Mar 6 17:22:30 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:30 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 24395 >/dev/null 2>/dev/null >selfserv_9218 with PID 24395 found at Wed Mar 6 17:22:30 MST 2013 >selfserv_9218 with PID 24395 started at Wed Mar 6 17:22:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4479: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 24395 at Wed Mar 6 17:22:30 MST 2013 >kill -USR1 24395 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 24395 killed at Wed Mar 6 17:22:30 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:30 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 24451 >/dev/null 2>/dev/null >selfserv_9218 with PID 24451 found at Wed Mar 6 17:22:30 MST 2013 >selfserv_9218 with PID 24451 started at Wed Mar 6 17:22:30 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #4480: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 24451 at Wed Mar 6 17:22:30 MST 2013 >kill -USR1 24451 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 24451 killed at Wed Mar 6 17:22:30 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:30 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 24519 >/dev/null 2>/dev/null >selfserv_9218 with PID 24519 found at Wed Mar 6 17:22:31 MST 2013 >selfserv_9218 with PID 24519 started at Wed Mar 6 17:22:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #4481: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 24519 at Wed Mar 6 17:22:31 MST 2013 >kill -USR1 24519 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 24519 killed at Wed Mar 6 17:22:31 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:31 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 24575 >/dev/null 2>/dev/null >selfserv_9218 with PID 24575 found at Wed Mar 6 17:22:31 MST 2013 >selfserv_9218 with PID 24575 started at Wed Mar 6 17:22:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #4482: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 24575 at Wed Mar 6 17:22:31 MST 2013 >kill -USR1 24575 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 24575 killed at Wed Mar 6 17:22:31 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:31 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 24631 >/dev/null 2>/dev/null >selfserv_9218 with PID 24631 found at Wed Mar 6 17:22:31 MST 2013 >selfserv_9218 with PID 24631 started at Wed Mar 6 17:22:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #4483: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 24631 at Wed Mar 6 17:22:31 MST 2013 >kill -USR1 24631 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 24631 killed at Wed Mar 6 17:22:31 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:31 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 24699 >/dev/null 2>/dev/null >selfserv_9218 with PID 24699 found at Wed Mar 6 17:22:31 MST 2013 >selfserv_9218 with PID 24699 started at Wed Mar 6 17:22:31 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #4484: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 24699 at Wed Mar 6 17:22:32 MST 2013 >kill -USR1 24699 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 24699 killed at Wed Mar 6 17:22:32 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:32 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 24755 >/dev/null 2>/dev/null >selfserv_9218 with PID 24755 found at Wed Mar 6 17:22:32 MST 2013 >selfserv_9218 with PID 24755 started at Wed Mar 6 17:22:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #4485: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 24755 at Wed Mar 6 17:22:32 MST 2013 >kill -USR1 24755 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 24755 killed at Wed Mar 6 17:22:32 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- >selfserv_9218 starting at Wed Mar 6 17:22:32 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 24811 >/dev/null 2>/dev/null >selfserv_9218 with PID 24811 found at Wed Mar 6 17:22:32 MST 2013 >selfserv_9218 with PID 24811 started at Wed Mar 6 17:22:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -12285: >Unable to find the certificate or key necessary for authentication. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >Incorrect password/PIN entered. >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer cannot verify your certificate. >tstclnt: exiting with return code 1 >ssl.sh: #4486: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 24811 at Wed Mar 6 17:22:32 MST 2013 >kill -USR1 24811 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 24811 killed at Wed Mar 6 17:22:32 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:32 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 24879 >/dev/null 2>/dev/null >selfserv_9218 with PID 24879 found at Wed Mar 6 17:22:32 MST 2013 >selfserv_9218 with PID 24879 started at Wed Mar 6 17:22:32 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #4487: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 24879 at Wed Mar 6 17:22:33 MST 2013 >kill -USR1 24879 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 24879 killed at Wed Mar 6 17:22:33 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:33 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 24935 >/dev/null 2>/dev/null >selfserv_9218 with PID 24935 found at Wed Mar 6 17:22:33 MST 2013 >selfserv_9218 with PID 24935 started at Wed Mar 6 17:22:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >ssl.sh: #4488: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >trying to kill selfserv_9218 with PID 24935 at Wed Mar 6 17:22:33 MST 2013 >kill -USR1 24935 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 24935 killed at Wed Mar 6 17:22:33 MST 2013 >ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:33 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 24991 >/dev/null 2>/dev/null >selfserv_9218 with PID 24991 found at Wed Mar 6 17:22:33 MST 2013 >selfserv_9218 with PID 24991 started at Wed Mar 6 17:22:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >ssl.sh: #4489: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 24991 at Wed Mar 6 17:22:33 MST 2013 >kill -USR1 24991 >selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 24991 killed at Wed Mar 6 17:22:33 MST 2013 >ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) >ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: Cache CRL SSL Client Tests =============================== >/builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/authin.tl.tmp >0 >selfserv_9218 starting at Wed Mar 6 17:22:33 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:33 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:33 MST 2013 >selfserv_9218 with PID 25063 started at Wed Mar 6 17:22:33 MST 2013 >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:34 MST 2013 >ssl.sh: #4490: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:34 MST 2013 >ssl.sh: #4491: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:34 MST 2013 >ssl.sh: #4492: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:35 MST 2013 >ssl.sh: #4493: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:35 MST 2013 >ssl.sh: #4494: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:35 MST 2013 >ssl.sh: #4495: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:35 MST 2013 >ssl.sh: #4496: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:35 MST 2013 >ssl.sh: #4497: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:35 MST 2013 >ssl.sh: #4498: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:36 MST 2013 >ssl.sh: #4499: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:36 MST 2013 >ssl.sh: #4500: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:36 MST 2013 >ssl.sh: #4501: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:36 MST 2013 >ssl.sh: #4502: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 >RELOAD time tests.* >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 119 bytes >tstclnt: Writing 119 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:36 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #4503: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:36 MST 2013 >ssl.sh: #4504: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:37 MST 2013 >ssl.sh: #4505: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:37 MST 2013 >ssl.sh: #4506: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:37 MST 2013 >ssl.sh: #4507: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:37 MST 2013 >ssl.sh: #4508: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:37 MST 2013 >ssl.sh: #4509: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:37 MST 2013 >ssl.sh: #4510: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:38 MST 2013 >ssl.sh: #4511: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:38 MST 2013 >ssl.sh: #4512: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:38 MST 2013 >ssl.sh: #4513: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:38 MST 2013 >ssl.sh: #4514: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:38 MST 2013 >ssl.sh: #4515: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:38 MST 2013 >ssl.sh: #4516: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 >RELOAD time tests.* >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 119 bytes >tstclnt: Writing 119 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:39 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #4517: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:39 MST 2013 >ssl.sh: #4518: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:39 MST 2013 >ssl.sh: #4519: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:39 MST 2013 >ssl.sh: #4520: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:39 MST 2013 >ssl.sh: #4521: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:39 MST 2013 >ssl.sh: #4522: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:40 MST 2013 >ssl.sh: #4523: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:40 MST 2013 >ssl.sh: #4524: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:40 MST 2013 >ssl.sh: #4525: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:40 MST 2013 >ssl.sh: #4526: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:40 MST 2013 >ssl.sh: #4527: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:40 MST 2013 >ssl.sh: #4528: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:41 MST 2013 >ssl.sh: #4529: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 25063 >/dev/null 2>/dev/null >selfserv_9218 with PID 25063 found at Wed Mar 6 17:22:41 MST 2013 >ssl.sh: #4530: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 25063 at Wed Mar 6 17:22:41 MST 2013 >kill -USR1 25063 >selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 25063 killed at Wed Mar 6 17:22:41 MST 2013 >ssl.sh: TLS Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:41 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:41 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:41 MST 2013 >selfserv_9218 with PID 26493 started at Wed Mar 6 17:22:41 MST 2013 >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:41 MST 2013 >ssl.sh: #4531: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:41 MST 2013 >ssl.sh: #4532: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:41 MST 2013 >ssl.sh: #4533: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:42 MST 2013 >ssl.sh: #4534: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:42 MST 2013 >ssl.sh: #4535: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:42 MST 2013 >ssl.sh: #4536: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:42 MST 2013 >ssl.sh: #4537: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:42 MST 2013 >ssl.sh: #4538: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:42 MST 2013 >ssl.sh: #4539: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:43 MST 2013 >ssl.sh: #4540: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:43 MST 2013 >ssl.sh: #4541: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:43 MST 2013 >ssl.sh: #4542: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:43 MST 2013 >ssl.sh: #4543: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 >RELOAD time tests.* >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 119 bytes >tstclnt: Writing 119 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:43 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #4544: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:43 MST 2013 >ssl.sh: #4545: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:44 MST 2013 >ssl.sh: #4546: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:44 MST 2013 >ssl.sh: #4547: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:44 MST 2013 >ssl.sh: #4548: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:44 MST 2013 >ssl.sh: #4549: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:44 MST 2013 >ssl.sh: #4550: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:44 MST 2013 >ssl.sh: #4551: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:44 MST 2013 >ssl.sh: #4552: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:45 MST 2013 >ssl.sh: #4553: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:45 MST 2013 >ssl.sh: #4554: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:45 MST 2013 >ssl.sh: #4555: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:45 MST 2013 >ssl.sh: #4556: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:45 MST 2013 >ssl.sh: #4557: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 >RELOAD time tests.* >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 119 bytes >tstclnt: Writing 119 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:46 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #4558: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:46 MST 2013 >ssl.sh: #4559: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:46 MST 2013 >ssl.sh: #4560: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:46 MST 2013 >ssl.sh: #4561: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:46 MST 2013 >ssl.sh: #4562: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:46 MST 2013 >ssl.sh: #4563: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:47 MST 2013 >ssl.sh: #4564: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:47 MST 2013 >ssl.sh: #4565: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:47 MST 2013 >ssl.sh: #4566: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:47 MST 2013 >ssl.sh: #4567: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:47 MST 2013 >ssl.sh: #4568: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:47 MST 2013 >ssl.sh: #4569: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:48 MST 2013 >ssl.sh: #4570: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: HDX PR_Read returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 254 >kill -0 26493 >/dev/null 2>/dev/null >selfserv_9218 with PID 26493 found at Wed Mar 6 17:22:48 MST 2013 >ssl.sh: #4571: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED >trying to kill selfserv_9218 with PID 26493 at Wed Mar 6 17:22:48 MST 2013 >kill -USR1 26493 >selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 26493 killed at Wed Mar 6 17:22:48 MST 2013 >ssl.sh: SSL3 Require client auth (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:48 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 27917 >/dev/null 2>/dev/null >selfserv_9218 with PID 27917 found at Wed Mar 6 17:22:48 MST 2013 >selfserv_9218 with PID 27917 started at Wed Mar 6 17:22:48 MST 2013 >ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) >trying to kill selfserv_9218 with PID 27917 at Wed Mar 6 17:22:48 MST 2013 >kill -USR1 27917 >./ssl.sh: line 173: 27917 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9218 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 27917 killed at Wed Mar 6 17:22:48 MST 2013 >selfserv_9218 starting at Wed Mar 6 17:22:48 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:48 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:48 MST 2013 >selfserv_9218 with PID 27951 started at Wed Mar 6 17:22:48 MST 2013 >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:48 MST 2013 >ssl.sh: #4572: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:48 MST 2013 >ssl.sh: #4573: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:48 MST 2013 >ssl.sh: #4574: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:49 MST 2013 >ssl.sh: #4575: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:49 MST 2013 >ssl.sh: #4576: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:49 MST 2013 >ssl.sh: #4577: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:49 MST 2013 >ssl.sh: #4578: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:49 MST 2013 >ssl.sh: #4579: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:50 MST 2013 >ssl.sh: #4580: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:50 MST 2013 >ssl.sh: #4581: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:50 MST 2013 >ssl.sh: #4582: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:50 MST 2013 >ssl.sh: #4583: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:50 MST 2013 >ssl.sh: #4584: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 >RELOAD time tests.* >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 119 bytes >tstclnt: Writing 119 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:50 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #4585: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:51 MST 2013 >ssl.sh: #4586: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:51 MST 2013 >ssl.sh: #4587: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:51 MST 2013 >ssl.sh: #4588: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:51 MST 2013 >ssl.sh: #4589: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:51 MST 2013 >ssl.sh: #4590: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:51 MST 2013 >ssl.sh: #4591: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:52 MST 2013 >ssl.sh: #4592: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:52 MST 2013 >ssl.sh: #4593: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:52 MST 2013 >ssl.sh: #4594: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:52 MST 2013 >ssl.sh: #4595: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:52 MST 2013 >ssl.sh: #4596: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:52 MST 2013 >ssl.sh: #4597: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:53 MST 2013 >ssl.sh: #4598: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 >RELOAD time tests.* >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 119 bytes >tstclnt: Writing 119 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:53 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #4599: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:53 MST 2013 >ssl.sh: #4600: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:53 MST 2013 >ssl.sh: #4601: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:53 MST 2013 >ssl.sh: #4602: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:53 MST 2013 >ssl.sh: #4603: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:54 MST 2013 >ssl.sh: #4604: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:54 MST 2013 >ssl.sh: #4605: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:54 MST 2013 >ssl.sh: #4606: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:54 MST 2013 >ssl.sh: #4607: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:54 MST 2013 >ssl.sh: #4608: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:54 MST 2013 >ssl.sh: #4609: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:55 MST 2013 >ssl.sh: #4610: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:55 MST 2013 >ssl.sh: #4611: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 27951 >/dev/null 2>/dev/null >selfserv_9218 with PID 27951 found at Wed Mar 6 17:22:55 MST 2013 >ssl.sh: #4612: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 27951 at Wed Mar 6 17:22:55 MST 2013 >kill -USR1 27951 >selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 27951 killed at Wed Mar 6 17:22:55 MST 2013 >ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:22:55 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:22:55 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:55 MST 2013 >selfserv_9218 with PID 29373 started at Wed Mar 6 17:22:55 MST 2013 >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:55 MST 2013 >ssl.sh: #4613: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:55 MST 2013 >ssl.sh: #4614: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:56 MST 2013 >ssl.sh: #4615: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:56 MST 2013 >ssl.sh: #4616: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:56 MST 2013 >ssl.sh: #4617: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:56 MST 2013 >ssl.sh: #4618: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:56 MST 2013 >ssl.sh: #4619: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:56 MST 2013 >ssl.sh: #4620: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:57 MST 2013 >ssl.sh: #4621: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:57 MST 2013 >ssl.sh: #4622: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:57 MST 2013 >ssl.sh: #4623: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:57 MST 2013 >ssl.sh: #4624: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:57 MST 2013 >ssl.sh: #4625: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 >RELOAD time tests.* >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 119 bytes >tstclnt: Writing 119 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:58 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #4626: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:58 MST 2013 >ssl.sh: #4627: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:58 MST 2013 >ssl.sh: #4628: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:58 MST 2013 >ssl.sh: #4629: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:58 MST 2013 >ssl.sh: #4630: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:59 MST 2013 >ssl.sh: #4631: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:59 MST 2013 >ssl.sh: #4632: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:59 MST 2013 >ssl.sh: #4633: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:59 MST 2013 >ssl.sh: #4634: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:22:59 MST 2013 >ssl.sh: #4635: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:23:00 MST 2013 >ssl.sh: #4636: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:23:00 MST 2013 >ssl.sh: #4637: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:23:00 MST 2013 >ssl.sh: #4638: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:23:00 MST 2013 >ssl.sh: #4639: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 >RELOAD time tests.* >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 119 bytes >tstclnt: Writing 119 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:23:00 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #4640: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:23:00 MST 2013 >ssl.sh: #4641: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:23:01 MST 2013 >ssl.sh: #4642: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:23:01 MST 2013 >ssl.sh: #4643: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:23:01 MST 2013 >ssl.sh: #4644: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:23:01 MST 2013 >ssl.sh: #4645: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:23:01 MST 2013 >ssl.sh: #4646: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:23:01 MST 2013 >ssl.sh: #4647: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x29 for socket out_flags. >tstclnt: PR_Poll returned 0x29 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:23:02 MST 2013 >ssl.sh: #4648: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:23:02 MST 2013 >ssl.sh: #4649: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:23:02 MST 2013 >ssl.sh: #4650: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:23:02 MST 2013 >ssl.sh: #4651: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:23:02 MST 2013 >ssl.sh: #4652: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 29373 >/dev/null 2>/dev/null >selfserv_9218 with PID 29373 found at Wed Mar 6 17:23:02 MST 2013 >ssl.sh: #4653: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 29373 at Wed Mar 6 17:23:03 MST 2013 >kill -USR1 29373 >selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 29373 killed at Wed Mar 6 17:23:03 MST 2013 >ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:23:03 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:23:03 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:03 MST 2013 >selfserv_9218 with PID 30795 started at Wed Mar 6 17:23:03 MST 2013 >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:03 MST 2013 >ssl.sh: #4654: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:03 MST 2013 >ssl.sh: #4655: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:03 MST 2013 >ssl.sh: #4656: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:04 MST 2013 >ssl.sh: #4657: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:04 MST 2013 >ssl.sh: #4658: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:04 MST 2013 >ssl.sh: #4659: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:04 MST 2013 >ssl.sh: #4660: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:04 MST 2013 >ssl.sh: #4661: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:04 MST 2013 >ssl.sh: #4662: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:05 MST 2013 >ssl.sh: #4663: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:05 MST 2013 >ssl.sh: #4664: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:05 MST 2013 >ssl.sh: #4665: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:05 MST 2013 >ssl.sh: #4666: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 >RELOAD time tests.* >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 119 bytes >tstclnt: Writing 119 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:05 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #4667: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:05 MST 2013 >ssl.sh: #4668: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:06 MST 2013 >ssl.sh: #4669: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:06 MST 2013 >ssl.sh: #4670: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:06 MST 2013 >ssl.sh: #4671: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:06 MST 2013 >ssl.sh: #4672: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:06 MST 2013 >ssl.sh: #4673: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:06 MST 2013 >ssl.sh: #4674: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:07 MST 2013 >ssl.sh: #4675: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:07 MST 2013 >ssl.sh: #4676: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:07 MST 2013 >ssl.sh: #4677: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:07 MST 2013 >ssl.sh: #4678: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:07 MST 2013 >ssl.sh: #4679: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:08 MST 2013 >ssl.sh: #4680: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 >RELOAD time tests.* >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 119 bytes >tstclnt: Writing 119 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:08 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #4681: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:08 MST 2013 >ssl.sh: #4682: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:08 MST 2013 >ssl.sh: #4683: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:08 MST 2013 >ssl.sh: #4684: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:08 MST 2013 >ssl.sh: #4685: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:09 MST 2013 >ssl.sh: #4686: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:09 MST 2013 >ssl.sh: #4687: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:09 MST 2013 >ssl.sh: #4688: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:09 MST 2013 >ssl.sh: #4689: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:09 MST 2013 >ssl.sh: #4690: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:10 MST 2013 >ssl.sh: #4691: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:10 MST 2013 >ssl.sh: #4692: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 1 bytes >H >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 136 bytes >TTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:10 MST 2013 >ssl.sh: #4693: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 30795 >/dev/null 2>/dev/null >selfserv_9218 with PID 30795 found at Wed Mar 6 17:23:10 MST 2013 >ssl.sh: #4694: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED >trying to kill selfserv_9218 with PID 30795 at Wed Mar 6 17:23:10 MST 2013 >kill -USR1 30795 >selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable > 0 stateless resumes, 0 ticket parse failures >selfserv: normal termination >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 30795 killed at Wed Mar 6 17:23:10 MST 2013 >ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- >selfserv_9218 starting at Wed Mar 6 17:23:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:23:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 32217 >/dev/null 2>/dev/null >selfserv_9218 with PID 32217 found at Wed Mar 6 17:23:10 MST 2013 >selfserv_9218 with PID 32217 started at Wed Mar 6 17:23:10 MST 2013 >ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) >trying to kill selfserv_9218 with PID 32217 at Wed Mar 6 17:23:10 MST 2013 >kill -USR1 32217 >./ssl.sh: line 173: 32217 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9218 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose >selfserv_9218 -b -p 9218 2>/dev/null; >selfserv_9218 with PID 32217 killed at Wed Mar 6 17:23:10 MST 2013 >selfserv_9218 starting at Wed Mar 6 17:23:10 MST 2013 >selfserv_9218 -D -p 9218 -d ../server -n localhost.localdomain \ > -w nss -r -r -r -r -i ../tests_pid.17100 & >trying to connect to selfserv_9218 at Wed Mar 6 17:23:10 MST 2013 >tstclnt -p 9218 -h localhost.localdomain -q \ > -d ../client -v < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:10 MST 2013 >selfserv_9218 with PID 32251 started at Wed Mar 6 17:23:10 MST 2013 >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:11 MST 2013 >ssl.sh: #4695: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:11 MST 2013 >ssl.sh: #4696: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:11 MST 2013 >ssl.sh: #4697: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:11 MST 2013 >ssl.sh: #4698: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:11 MST 2013 >ssl.sh: #4699: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:11 MST 2013 >ssl.sh: #4700: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:12 MST 2013 >ssl.sh: #4701: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:12 MST 2013 >ssl.sh: #4702: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:12 MST 2013 >ssl.sh: #4703: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:12 MST 2013 >ssl.sh: #4704: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:12 MST 2013 >ssl.sh: #4705: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:12 MST 2013 >ssl.sh: #4706: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:13 MST 2013 >ssl.sh: #4707: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 43 - 48 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 >RELOAD time tests.* >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 119 bytes >tstclnt: Writing 119 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:14 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #4708: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:14 MST 2013 >ssl.sh: #4709: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:15 MST 2013 >ssl.sh: #4710: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:15 MST 2013 >ssl.sh: #4711: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:15 MST 2013 >ssl.sh: #4712: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:15 MST 2013 >ssl.sh: #4713: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:16 MST 2013 >ssl.sh: #4714: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:16 MST 2013 >ssl.sh: #4715: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:16 MST 2013 >ssl.sh: #4716: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:16 MST 2013 >ssl.sh: #4717: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:17 MST 2013 >ssl.sh: #4718: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:17 MST 2013 >ssl.sh: #4719: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:17 MST 2013 >ssl.sh: #4720: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:17 MST 2013 >ssl.sh: #4721: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED >================= Reloading CRL for group 49 - 52 ============= >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 >Request: >GET crl:///builddir/build/BUILD/nss-3.14.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 >RELOAD time tests.* >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 119 bytes >tstclnt: Writing 119 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:17 MST 2013 >================= CRL Reloaded ============= >ssl.sh: #4722: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:17 MST 2013 >ssl.sh: #4723: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:18 MST 2013 >ssl.sh: #4724: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:18 MST 2013 >ssl.sh: #4725: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:18 MST 2013 >ssl.sh: #4726: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:18 MST 2013 >ssl.sh: #4727: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:18 MST 2013 >ssl.sh: #4728: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:18 MST 2013 >ssl.sh: #4729: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:19 MST 2013 >ssl.sh: #4730: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:19 MST 2013 >ssl.sh: #4731: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:19 MST 2013 >ssl.sh: #4732: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. >tstclnt: exiting with return code 1 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:19 MST 2013 >ssl.sh: #4733: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server -1 bytes >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: using asynchronous certificate validation >tstclnt: Read from server -1 bytes >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 2 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: Read from server 137 bytes >HTTP/1.0 200 OK >Server: Generic Web Server >Date: Tue, 26 Aug 1997 22:10:05 GMT >Content-type: text/plain > >GET / HTTP/1.0 > >EOF > > >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: PR_Poll returned 0x01 for socket out_flags. >tstclnt: Read from server 0 bytes >tstclnt: exiting with return code 0 >kill -0 32251 >/dev/null 2>/dev/null >selfserv_9218 with PID 32251 found at Wed Mar 6 17:23:19 MST 2013 >ssl.sh: #4734: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED >Server Args: -r_-r_-r_-r >tstclnt -p 9218 -h localhost.localdomain -f -d ../client -v \ > -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.14.3/mozilla/security/nss/tests/ssl/sslreq.dat >selfserv: SSL_ForceHandshake returned error -8180: >Peer's Certificate has been revoked. >tstclnt: connecting to localhost.localdomain:9218 (address=::1) >tstclnt: connect: Operation is still in progress (probably a non-blocking connect) >tstclnt: about to call PR_Poll for connect completion! >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: ready... >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 18 bytes >tstclnt: Writing 18 bytes to server >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: using asynchronous certificate validation >tstclnt: handshake was paused by auth certificate hook >tstclnt: about to call PR_Poll on writable socket ! >tstclnt: PR_Poll returned with writable socket ! >tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC >tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA > Compression: NULL >subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US >issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US >0 cache hits; 1 cache misses, 0 cache not reusable >0 stateless resumes >tstclnt: PR_Poll returned 0x02 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for stdin out_flags. >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: stdin read 0 bytes >tstclnt: PR_Poll returned 0x00 for socket out_flags. >tstclnt: about to call PR_Poll ! >tstclnt: PR_Poll returned! >tstclnt: PR_Poll returned 0x01 for socket out_flags. >